Category Archives: Crime

Why am I Being Targeted? A Valuable Question for TIs


Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
What you will learn reading this post:
• there are three primary reasons why TIs are targeted;
• knowing which it is can result in better defensive/offensive strategies;
• it is possible to discern the difference in many cases;
• there used to be a fourth kind, but what it really is will surprise you.
  x

The way it is

Of the 12,000 plus persons reaching out to me over the last two decades because they were being targeted with some form of Political Control Technology (PCT), almost without exception, the first thing asked is ‘Why… why me?’ Naturally, there are endless other questions which are also asked, all of them seemingly unanswerable, and all of them deeply troubling and part of the psychological mind games which are inherent in all forms of mind control.
  x
27419003986.jpegThere were three or four possibilities, and the best answer which could be offered up front was simply to cite those reasons, a generic answer which lead to no peace of mind, and which usually lead to even more difficult to answer questions. And yet, to get to the bottom of things and mount a viable defensive/offensive strategy, such questions needed to be answered; you cannot fight a problem you do not understand.
  x
This is why targeting tactics include significant effort into misleading the TI into thinking all manner of incorrect facts about their targeting. Out of the 12,000, I have only ever encountered perhaps 4 who truly had it right. Defending the wrong problem results in failure, amplifies the power of the mind games through frustration of defeats, and sets the TI up for looking insane (or even driving them to that state), almost always another goal of the targeting, the very means of neutralization, and the best measure of success.
  x
And so, in order to get those answers, I established my free Helps Kit (proparanoidgroup@gmail.com), and its use, in turn, enabled me to offer a variety of for-fee consulting services aimed at formulating appropriate combat tactics. In almost all cases, even if not electing my services, the Kit lead to some improved understanding and ability to withstand targeting. The services almost always amplified that result, and in all-too-few cases, enabled a complete stop of the targeting, usually with some form of remuneration or compensation to the victim through what I term a ‘blackmail insurance policy.’
  x
So YES, it is right to ask why. So let’s look at the generic answer, and see where it leads us.
 x

The Three Answers

I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.

1) the actual intended use is ‘political,’ which translates as any form of disapproval of the TI which may require punishment or neutralization short of an assassin. Whistle blowers or potential whistle blowers, cult members evicted from, or who quit the cult, etc;
2) ‘experimentation’… extending the state of the art;
3) ‘training.’ Guinea pigs for trainees are targeted in order to achieve across the board predictable efficiency.
   x
What we used to perceive as a fourth reason was sometimes called ‘Joyriding’. In truth, if falls into experimentation, but not upon the TI — upon the perps. Actual joyriding can take place… the unauthorized used of tech/methods for personal gratification… but more than likely, to the abuser, it is in the realm of ‘political,’ to
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
x
93d5bea6cce0329abcf9fc97431684c0.jpgMany perps are themselves TIs, either actual mind control victims or persons (typically sociopaths or psychopaths) who are put into experiments to see how THEY react in a perp situation based on THEIR psychological profile and the specific circumstances of the TI-to-perp interaction/response cycle. In fact, the TI is almost superfluous to the equation, once their suitability has been determined (their profile), and considered a consumable and expendable item in the project — though controls exist to prevent such harms as might result in Police investigations which might defy cover up arrangements.
  x
An easy example is the infamous Yale experiments on authority conducted by (presumed CIA) Psychologist Stanley Milgram, ostensibly funded by CIA under MK-Ultra. There, volunteer students were given the choice of playing teacher or student roles in what was described as a learning experiment, with an observer who was authority over the ‘teacher,’ who was de facto authority over the ‘student.’ The teacher would test the student and punish wrong answers with an electrical shock, increasing the voltage for repeat errors. There were lies in the mix which changed the reality to something else, but in the end, the observer would instruct the teacher to continue the increases in voltage to the level of lethality.
  x
In that study, those playing student were not real student volunteers, but paid actors, and no one was actually being shocked or harmed. But a similar study by Professor Phil Lombardo, the Stanford Prison Experiments, resulted in actual sadistic violence so troubling that it had was made into a motion picture. There, everyone was being studied, but the guards believed only the prisoners were being studied, so the core experiment was focused on them. This experiment, too, is thought to have had government backing of some sort, as this was in the days of COINTEL and COINTELPRO operations by FBI and the U.S. Army under Nixon, a program thought enhanced and behind much of today’s targeting of citizens. In any event, it had been ‘blessed’ by the American Psychiatric Association, which at one time was headed by former CIA mind control scientists (like all such organizations).

Knowing the difference can alter TI tactics

 One needs to fight the right problem. So it is critical to know which reason applies. There are some general defenses which can be used regardless of the form of targeting, but there are also specific defenses which in the end, are likely more productive. While every TI’s situation and circumstances can dramatically impact on exactly HOW to effect such defenses, and especially offensive responses, what follows below are my ‘generic’ answers which are, unfortunately, somewhat simplistic in description. A TI should be very cautious in experimentation trying to find the best way to implement a given solution.
  x
The key most generics which apply to all reasons for targeting, are a bit more straightforward. Chief among them is to increase site security (i.e., pickproof deadbolt on a primary entrance, all other entrances secured such that only breaking and entering is an option — which perps don’t like to do because it leaves physical evidence in support of the victim’s claims of targeting). That can also mean use of video security monitoring systems, security lighting, and so forth. I am not a fan of monitored alarm systems (most such firms have intelligence community ties), but I do like off-the-shelf component alarm systems, perhaps with online monitoring by YOU.
  x
Another generic tactic is to Stop, Think, then Act, instead of simply to react. Instead of reacting to a targeting stimuli or event, STOP: Think about what they want or expect you to do in reaction, and instead, Act (as actor) in some random contrary way. They use your reactions to gauge effectiveness of their methods, and methods are calculated based on your psychological profile. Acting, done believably (don’t over act, don’t elect a totally absurd response) can screw with them in ways which sees them doubting both their methods and the accuracy of your profile, and cause them to retreat to square one, reducing your trouble and giving you a rest period. However, before that happens, you must brace for increased attack levels, until they accept that something is truly wrong.
  x
And, of course, I also advise at least the first two books in the Professional Paranoid series. The Professional Paranoid gives how-to advice with respect to traditional targeting, which is always part of PCT targeting. The second, MC Realities, gives how-to advice about the PCT variety. The third book, The Defensive Field Guide, is simply a compendium of references and resources, primarily educational and especially useful as ‘proofs’ when trying to convince non believers that the technology and history of its use by government is real. Learn more about my books, music, and videos on these kinds of topics using my WordPress pull down menu (page top). Additional blog posts on topic are also available, here.
  x
Political targeting almost always involves a ‘full-court press.’ The victim will likely suffer electronic weapon targeting, gangstalking, dirty tricks designed to destroy all resources, including finances, relationships, and reputation. They tend to be harassed by law enforcement and other civil agencies, and will likely in time discover they have been implanted with various devices to allow tracking, cause pain, provide voices in their head, and perhaps, suffer use of chemicals and gasses. Everyone will seem to turn against them, for they have been turned by the flashing of badges and requests for ‘help’ by ‘investigators’ of some horrible thing (i.e., pedophilia, terrorism, etc.)
  x
The best defense is to determine exactly what thing it is they fear about you such that targeting was justified in their mind (which may be false beliefs about you). It usually has to do with something work related, or if a college student, something witnessed or experienced at school. Knowing the reason for the targeting will give you the who. With the who, why, and how answered, it is often possible to crate that blackmail insurance policy.
  x
But it also may be that you had already been a victim of childhood abuses designed to create split personalities which could be ‘programmed’ to make you into a programmable person (think in terms of a Jason Bourne or Manchurian Candidate). For every Bourne successfully created, there are likely dozens of ‘failures’ which are kept around to become patsies or for fodder in some future plot. Such persons are often targeted to keep them off balance and looking insane in order to prevent exposure of the greater programming project. If you think you might be one of these, contact me for further evaluation.
  x
Experimental targeting almost always does NOT involve a full-court press. It is usually to test a specific PCT or PCT combination. In some cases, this is actually a better experience as a TI, because of that fact. But in other cases, it can mean very exceptional and horrific targeting levels. Where it is the perps who are the subject of the experiment, it is more likely for the TI to have a  yo-yo experience, even seeming lapses in targeting. Finally, another clue is bizarre symptoms atypical from other TIs. This usually means some new, advanced technology is in play. The more ‘crazy sounding’ the experience is, especially against other TI experiences, the more likely is it experimental tech… unless, of course, one actually is schizophrenic. But even that can be a clue (see training targeting, next).
  x
If it is concluded that perps are the true subjects, you can apply the same defense as advised in the training targeting (next). Otherwise, it is hard to give specific advice for something which may not be based on known technology or methods, but it is just as likely to be based on psychological experimentation as it is technical. In the later case, there will be no bizarre experiences (comparatively). In either event, I suggest you contact me and perhaps we can figure out something to try which is based on whatever is going on.
  x
Training targeting will again feature yo-yo symptoms/effects, and perhaps brief lapses in targeting, but the symptoms will not be atypical of other victims. Because it will involve perps who may be ‘stupid’ about important errors that can be made, it is typically used against people who already have some history of mental health treatment. Schizophrenia, paranoia, or extreme schisms are popular ‘excuses’ which can hide any such targeting errors and prevent exposure of the training project. Authorities will presume the mental state of the victim the cause of their complaint, even to the point of ignoring physical evidence, such as burns on the body, which would be thought self inflicted. As in all targeting cases, regardless of type, reason, etc., I advise never to go to authorities unless you have courtroom quality evidence and witnesses or other proofs to counter any notion of mental illness.
  x
Another clue it is training leads to defensive options. One will see a routine change of players, if one can locate the nearby perp operating posts. Training commonly requires at least one ‘instructor’ and one or more ‘trainees’ at a time. They are not family, and are not in the same social or affluence levels, and will tend to seem odd matches for each other, both in dress, and likely, in age. And, there are likely three sets of them to allow three shifts a day (not always – where targeting varies during the day and is consistent at night, the nighttime targeting may be automated), which would mean a lot of coming and going of different people. And, as there will be graduations, there will be a larger cycle of all new people, which may or may not include brief lapses in targeting, or renewed cycles of targeting experience which might be described as starting low and simple, and advancing to high and complex, over time.
 x
The defense is simply to document the comings and goings, and the patterns of electronic attack signals. Rely on video, get license plates, record times, etc. This may enable you to obtain help from authorities, or perhaps to take legal action. But I warn you, the material must be legally compelling, and overwhelming. You will need a lawyer’s advice more than mine.
x

About Death Threats

Many TIs talk about thinking their perps are trying to kill them. Some talk about actual death threats and events which seem to be ‘failed attempts.’ Some reference  deaths which have taken place as ‘suspicious.’ It is true that numerous TIs have died while being targeted. These deaths are not outside of the norms of actuarial tables for a given group of people, given the many tens of thousands of TIs who actively so identify themselves. And as investigator, I have yet to see any compelling evidence of an actual murder, or staged accidents. I know of only one accidental death at the hands of a perp… which would possibly warrant a murder charge… definitely warrant manslaughter charges.
x
So, despite the insistence of TIs, I am equally adamant that murder is not the intent of targeting. Given the resources and skills of who is involved in targeting, if they wanted a person dead, they would be dead. They would not issue a threat or any other kind of warning, they would just get the job done. And, keep in mind that one reason targeting has been developed and deployed for political use is specifically to avoid murders. Murders can result in investigations which have the potential of blowback. But targeting creates a ‘mentally ill plaintiff’ who will be ignored, and is who is therefor a political (and social, financial) zero.
Therefore, where a targeting situation involves such threats, I deem it to mean one of two things. Either the TIs defenses are becoming effective and they seek to deter… using a bluff… in which case it is likely to be in a political targeting situation — or it is part of an experimental targeting project. In all cases, it is a mind game and should be ignored outwardly, while inwardly increasing defensive posture and alertness. If actual attempts are made, that is entirely another matter, and should be documented and likely, taken to law enforcement. Not that they will do anything about it, but it gets it on the record, such that if things become more serious, they might respond appropriately.

Who’s Killing the Bilderbergers?


Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com. 

What led to this book? The definitive International conspiracy.

After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.

The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.

 

16819237_985524731587546_4614382031226083422_o.jpg

The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.

The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.

Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page.  But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.

This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.

 

Why UTC matters to this new book

Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.

suiciding-the-bankers

This image relates to one of two strings of real World International murders footnoted in Who’s Killing The Bilderbergers, as cited in this book. From http://humansarefree.com/2016/06/mainstream-media-finally-admits-mass.html

 

Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.

Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.

 

The plot thickens

I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.

bilderberg.jpg

Each Bilderberger tends to be an Officer or Board Member of multiple corporations, and has sway over yet others through major stock holder positions, or contractual agreements. Of course, many of these companies, in turn, control other companies, sometimes, long lists. Now, imagine what this Cloud Map would look like if we knew the actual identity of ALL Bilderbergers, and not just this handful. Then add CFR, Trilateral Commission, Club of Rome, Council on Foreign Relations, and on, and on; the Round Table Globalists; the modern-day illuminati.

By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).

As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.

 

An important detail

And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true.  There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.

 

 

 

TI Defense: 30 Tips to Help Fight Back


If there is one thing I’ve learned after having contact with 12,000 Targeted Individuals over some 25 years, it is that without help, they have no good chance at properly dealing with their targeting. There are many reasons self help fails, and yet the solutions are not that complex.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 

The TI dilemma

I have never met a long-term Targeted Individual (TI) who did not have the same generalized and massive array of problems. The easiest victims to help were those who had only recently become aware of targeting, as their problem list was much shorter, making defensive solutions easier to derive and implement. But for everyone else, the list of issues was, well, mind boggling. I would see it in the very first communication (typically email or letter). It would be as if a letter about life from Lil Abner’s (by Al Capp) character, Joe Btfsplk, who never had a good thing happen to him or anyone around him.

JoeBtfsplkPanel.png

Note: I am no longer in a position to offer such personal helps. I do still offer a free Helps Kit by email which is useful to the TI in multiple ways, and I’ve written many how-to books on topic which are quite detailed and useful, to date still the only ones of their kind, as far as I am aware. I am still open to email contact at proparanoidgroup at gmail com, and can field simple generic questions, but I no longer engage in situational analysis and tactical advice, investigations, or direct intervention. This post is intended to help take up that slack.

That first contact would be pages long, typically, in story telling mode, and full of unhappy emotion, a hard thing to read; both in terms of eyestrain and emotional drain. Paragraph after paragraph of one problem or targeting issue after another. There would be a long list of events and suspect perps (perpetrators). It would commonly entail problems with their job, their family, their church or other membership, their neighbors, the cops, the legal system, the medical system, their financial situation, their computer security, and more, to include actual targeting symptoms impacting their health, and at times, the health of their pets and their plants.

The effects would be physiological, emotional, mental, and in some cases, impact physical objects. It must have been even harder for them to compose it, than for me to read it. Each such effect might entail a variety of individual symptoms and clues as to cause. Oddly enough, typically NON OF IT IS USEFUL in providing helps. Their valiant and painful plea for help ends up being little more than an exhaustive rant in terms of value in a practical investigative analysis. The ONLY way to tackle targeting usefully, either as a helper or as a victim, is to start completely over, which is why the Helps Kit was evolved; it started over in a way which simplifies, organizes, and quantifies useful information.

A Detective investigating a crime does not want to hear the long drawn out account of the victim up front. They start with a GENERIC description of the nature of the crime from the Cop on the scene (who did get that account from the victim), and then they INTERVIEW the victim with SPECIFIC simple questions aimed at nibbling away at facts in order to find the ones which represent CLUES. “What did you see? What was said?” and so forth, each question hopefully suggesting another. They then use the answers to solve the crime. A good model for helpers and TIs, alike. A flood of data drowns the truth, but point-by-point realizations build toward it.

There is another problem. While their described symptom or effect may perfectly match a known Political Control Technology (PCT) or method, it is also absolutely true that each and every example could also be due to a natural medical situation, or have a simple but yet as unknown social, or financial cause. Since authorities and professionals who are the natural ‘go to’ for help prefer not to believe in the Boogey Man, the assumption is always that a natural cause is to blame. A wise TI would do the same, seeking to eliminate any such possibility.

Failing the wisdom creates more problems for the TI, even when the go-to helper cannot find the natural cause or address it, because it is next easiest to blame the TI for the problem, even to the point of accusing them of being a paranoiac schizophrenic; the easy out. For the record, when working long term with a TI, I will in time discover the truth, and the truth is, purely imagined targeting among those reaching out to me has proven quite the exception. But some might be delusional, of course, but I’ve also learned that persons with mental issues are often selected for targeting in training projects, so that any serious mistake by trainees will be far less likely to draw interest of authorities, who will make the assumption the whole thing was imagined.

 

The bigger problem

packedmeal

Targeting: The covert Elephant in the Room which must be devoured if to well survive, but HOW?

As result of all these things, a TI is faced with so many problems, and so many clues, that they can literally find themselves immobilized by confusion, unable to reason it out, or even unable to cope. And yet, there is always one more problem, far more serious than the rest: they do not understand the truth of their targeting situation. I’ve never known a long term TI who did not have a false belief as to the nature, cause, purpose, source, and method of their targeting. This is by design, a primary goal of targeting; to create a false belief structure which makes it impossible to defend against, because defenses will be aimed at the wrong problem.

This further makes easier another primary goal, to make the victim seem crazy, either by their reactions being seen as paranoiac, or by telling others things deemed insanely impossible. But to underscore, the biggest problem is that their defenses will not meet the need, resulting in failure and frustration, a tool for their tormentors. So, finally, they come to me in a desperate state, not just in terms of needing help, but in terms of simply needing someone to listen to them and actually believe their story.

No one should presume a TI’s story to be imagined or fake, though it is true there are some who pretend for ulterior motives. In time, the truth will out. But because of their failure to truly understand the nature of their targeting, they might have been led to believe almost any untrue thing which cannot be seen as rational. For instance, one victim (who was schizophrenic, as well) believed they were beset by Alien vampires. In truth, the targeting was evolved against the person because they had discovered a firm involved in illegal dumping of biohazard materials, and to insure that her story was not believed by authorities, they led her to so believe. They relied on her schizophrenia to protect them from discovery both as perps inflicting mind control, but as criminals violating Federal law. The schizophrenia, itself, made that easier to accomplish.

 

How to eat an Elephant

The old saying is, one bite at a time. Here are the bites, a series of axiomatic advice points presented in a somewhat stepwise manner, the same things I would normally work through with every client. Remember, only you can decide any risks involved, and take the wisest course of actions based upon those perceived risks. This is merely a guideline of what has worked well in the past, and is generic in nature…

  1. Acknowledge your belief structure has been manipulated and you do not likely truly know the who, what, why, and how of things; you have been deliberately mislead. Following this guideline should help address that flaw, but only if you remain open to the possibility. Educate yourself about PCT and know your enemy, and always seek and eliminate any possible alternative explanations — but also keep in mind the pitfall cited at this post’s end;
  2. Be wary of professionals which we should otherwise rely upon, such as doctors, lawyers, dentists, and private investigators. Most will either walk away or take advantage of you on the assumption you are crazy, or worse, seek to have you evaluated by mental health professionals. The best strategy regarding that, is to seek an evaluation on your own: a written clean bill of mental health can be a wonderful defense if eventually accused of being delusional, even if by authorities. If you must find a professional, including a therapist, your best bet is to go to a city at least 50 miles away, and find a relatively recent graduate (i.e., a lawyer new to the Bar), of some minority race. They are likely to be hungrier for work, and more anxious to do a good job, and less likely to have had their morals corrupted over time by the industry. Avoid saying you are targeted, just tell them your concern and enough facts to get their interest. Answer their questions, but where a question requires an answer which gets into targeting details, give the details, and offer no presumption of cause, even if asked. Let THEM make that conclusion on their own, or not — it should not change how they perform for you;
  3. Cops, on the other hand, will either instantly so peg hole you, or worse, turn out to be in place assets working with the enemy against you. If you MUST do so (as in reporting a crime), or if you choose to become a TI activist or otherwise ‘go public’ (includes any Web presence), follow the advice found here;
  4. Start and maintain an event log. Use a voice activated (VOX) recorder kept on your person to make verbal notes describing questionable events, suspect persons, vehicles, etc. Leave it on to capture events directly, automatically. Transfer this at days end using headphones, to a computer spreadsheet or database file. It should include Time, Date, Location, Description, Details, and your emotional or intuitive thoughts at the time as to what it might mean. Compare new events of the day with older events, looking for patterns, frequent appearances of the same person, vehicle, etc. With respect to persons, give them a ‘code name’ based on their appearance or behavior until able to acquire their actual name. For vehicles, do get plate numbers, but since plates can be replaced or stolen, also note vehicle damage, stickers or decals, and the like. This will help you get closer to the truth of your targeting, and may be useful as evidence at some point;
  5. Remember that if you have a pattern in your life (such as going to work the same general time of day along a given route), so do others. Do not be concerned in such routines to see others around you repeatedly, because other people also have routines which may overlap with yours. DO be concerned if seeing the same person/vehicle at disparate locations and times when out of routine, and especially if also noted while in routine;
  6. Establish site security at home, and to the extent possible, work. My book, The Professional Paranoid will help, but in general, you need to insure no door, window, or opening can be accessed from the outside, even with a key, without breaking and entering. Perps don’t like to do that, because it leaves proof you are not imagining things. The only entrance that should be key accessible, should be via a pick proof deadbolt lock. Put one on your garage door, as well. If you can, install security lighting and a video monitoring system. Protect rooms and entrances or items with simple alarms, and employ and document any trip traps you set per the instructions in my book;
  7. Establish computer security AFTER site security. Backup all files, wipe the hard drive, reformat, reinstall OS, set new password, reinstall apps, restore files. Discard wireless keyboard. Disconnect from Internet. Buy cheap used iMac and set it up to be a local server, connect it to the Internet with Web sharing turned on, connect your main computer to it. Download a Web security monitoring utility to run continuously on the Mac, check it daily. Reset your router/modem to factory specs, install new password. Repeat this process and reset and all passwords regularly, do not use same PW for all. Consider to join the Free Will Society, a closed Facebook Group I maintain (application is via the Helps Kit mentioned in the Note near page top), or any of the many public TI Groups on FB (I am member of many);
  8. Improve personal security, starting with phone. NO CELL PHONE IS YOUR FRIEND. Keep it in a foil pouch, turned off when not in use. Where that is not practical, remove battery and install only to check for calls to make calls, or other use. If a smart phone, there are a number of apps I suggest you install. Mobile Justice from ACLU; an aircraft tracker that sees transponders; Spectrum Analyzer and/or EMF Detector; RSOE EDIS notifier; iTriage health advisor. You MUST disengage certain features. Cary a camera ready to go (not cell phone) and voice activated recorder to document events. More advice in my book, including land lines and general bug detection;
  9. While observing (3,4), avoid trying to deal with the sum total of the problem. It becomes a matter of ‘too many clues,’ per the introduction of this post. Instead, choose any ONE. Then review all others for any which seem related, aligned, supportive, or opposing, and set them aside for study as a subset. Analyze these, alone, formulate a means to prove or disprove each clue, and based on those results, validate, reject, or find the subset unresolvable, and move on to the next subset;
  10. You MUST presume any physiological symptoms are potentially actual health issues and seek a Doctor’s advice. When doing so, do NOT mention targeting, but it is OK to mention external symptoms (pets, plants, etc.) as might possibly be related. Pursue any suggested treatments until no treatment proves useful. ONLY THEN will you know the truth, and be closer to true understanding of your targeting, andy you may actually improve or cure actual health problems as well. Along these lines, anything you can do to impact your physical, mental, and psychological well being is to your good — become a health nut and try everything that claims a benefit, as everyone’s situation and physiology is different, but products seldom attempt claims of addressing targeting effects; you won’t know until you try it — but try only one new thing at a time, or you won’t know which is responsible for good outcome;
  11. Deal with Gangstalking. Very simple. Ignore it. It is only there to jerk your chain, and that only happens if you allow it to happen. You can choose not to be upset, worried, etc. Document it, yes, but laugh at it and them for wasting their time and money. This is simple in concept, and yet hard to do because of human nature. Stop, Think Act, practice, practice, practice;
  12. My book MC Realities offers a very good review of how to detect, identify, and deal with PCT. Once a better understanding is obtained from he previous steps, you can start to defend yourself more usefully with these trial and error methods, which should give you some good specific truths about your targeting.  In general, we worry about implants, which can include voice to skull (V2S), Directed Energy Weapons (DEW) which cause physical harms, mood/sleep control; and other electronic tech which can also account for V2S. The precise defensive/offensive tactics will vary to type and specifics. Shielding is almost always the best defense, but there are so many factors that the easiest thing to do is to shield an entire room for a few hundred dollars, but other methods should be tried first, as that is where the targeting truths can be learned. Where there are problems still encountered, feel free to contact me;
  13. If your targeting involves pain inducement DEW, or you have actual medical conditions which cause pain, ask me for my Jedi Mind Trick, the best way to describe a method I have developed which allows one to mask pain with nothing more than the power of their mind. It is difficult to master and requires practice, but once mastered, it is easy to apply, and for some users, it can also turn your body into an EMF meter for advanced warnings of attacks, and has application to general problem solving, including the issue of true understanding of the targeting’s nature. I use it to eliminate pain from toothaches (a Molar who’s roots were growing through my gums, into my mouth, and into my cheek), burns, fibromyalgia, and even tinnitus, and I can use my hands to find power lines in walls, as well as microwave and EMF sources. Demonstrated it many times;
  14. Once defensive efforts are well in hand, there may be some significant offensive opportunities. These are outlined in my books. Should you think any are appropriate, feel free to run your ideas about implementation by me for fine tuning or other commentary;
  15. As a rule, a TI has no concrete knowledge of the reason why they are targeted. Exceptions tend to be incorrect, as earlier mentioned. Knowing the who and why us the key-most truth, as it can sometimes lead to establishing a blackmail insurance policy. This key can sometimes be discovered in memories.  Go back in time in your mind to a point roughly six months to a year prior to first noticing your targeting. You would be looking for some odd or unusual event or thing overheard or seen. It might be an argument or a document or a conversation which, at the time, did not make much sense to you, but stood out as unusual in some way. Almost always, it is a work related memory, especially if your work had some relationship to government, intellectual property, high finance, or high profile legal matters; the sort of place where conspiracies and dark crimes might hatch, take place, or be evidenced. Should you find such a memory, contact me for general advice on how to verify its usefulness and take advantage of it;
  16. Where defense cannot be well achieved or maintained, relocation can typically buy several weeks to months of temporary relief. Often, simply going mobile can offer at least partial, if not full relief for a time, especially when not in your own vehicle, and leaving behind all personal possessions (new clothes, luggage, etc.) and taking no phone, NOT CALLING ANYONE, visiting online accounts, or purchasing anything on a card. For a more permanent solution, consider residency at Free Will Haven, a targeting-free self-sufficient and low-cost intentional community project of the Free Will Society, which is based on tiny homes living. I myself have been living quite comfortably in about 120 square feet (excessively tiny) for the last three years, and am quite content to do so, sacrificing little in the way of lifestyle, otherwise. Again, an application is contained within the Helps Kit mentioned in the Note near page top.
  17. Be prepared for local, regional, national, or even global social turmoil, be it disaster, civil unrest, martial law, real or false flag terrorism, revolution, race war, or political or financial upheaval. PCT has been being ramped up in terms of victim numbers (some estimates place the national number as high as 12,000,000) and individual intensity. It is my belief that the reason so many people are being targeted and the targeting is increasing, is we are heading to a crescendo designed to amplify any crisis turmoil in order to enable a shift in government form, all in the name of restoring national security and social order. Arrange to have a 90 day supply of food and emergency supplies and basic tools. Leverage your preparedness with a visit my special Facebook pages and review each post found there: the Post Apocalyptic Library of portable survival how-to knowledge; the Post Apocalyptic Local Area Defense Network, especially useful to TIs even without a crises event; and the FEMA, Martial Law, Revolution Database;
  18. Consider dropping off of the Grid; escape the Matrix (there is an actual matrix involved), perhaps even with a new identity. This is seldom possible while still being targeted, but the attempt, if done properly, can buy you significantly more targeting-free time before you are reacquired. This two-part post can help.

 

Additional advice

There are also some common mistakes that TIs make which can be avoided. Oddly enough, almost every TI has already made them, and yet, tends to continue making them, failing to see the risk they pose until till late. Here is a summary list, but remember, there are no hard and fast rules. There can always be an exception. If you think you have encountered one, contact me for review to see if I might not agree, or why not.

  1. NEVER seek help from authorities or ERTs due to targeting, itself. If an actual injury or crime is involved, such as vandalism, death threat, theft, etc., by all means report it, as having it on record can be useful evidence of targeting for possible use at some future point — but do not mention targeting concerns, and once more, follow the guidelines found here. If questions are asked as to why someone might undertake an action against you, you CAN mention that there have been strange things happening and you might choose one or two examples, if asked to cite them, but state you have no understanding as to why anyone would do so, and that you have no suspects (even if you do). The last thing you want is an investigation which concludes you are mental, which is where it almost always will end up going the moment you deviate. It may be wise to apply this rule to friends and family, and certainly to co workers, as you can end up destroying relationships with disclosure. The only exception should likely be limited to those living with you, and even then, you will pay a price. I lost a wife and a foster daughter to it, and possibly another daughter;
  2. NEVER react to targeting stimuli if you can avoid it. Train yourself to Stop, Think, and ACT, do not REACT. You, STOP yourself from reacting, THINK about what they are trying to cause you to do (i.e., get angry), and the ACT contrary to that in some random manner. This both negates the purpose of the targeting, and causes perps all manner of concern, either about the validity of the psychological profile they had prepared on you in order to determine the best targeting methodology, or the operational reliability or skill of any equipment or perps involved. This can at times lead to dramatic increases in targeting efforts, but if you continue the ploy, it will lead to them trying to ‘repair’ whatever problem they think is the cause. That typically results in a small rest period of no attacks. Eventually, it can destroy the effort entirely, especially if this method is applied by someone in early targeting, as it prevents them from advancing to other kinds of targeting, or they advance and abandon the failing method(s). This, and use of the Jedi Mind Trick, and numerous blackmail insurance policies (each time I created one for a client, it protected me, as well) is how I have managed to negate nearly three decades of attempted targeting and its consequences; I do not consider myself a TI, because I keep winning;
  3. NEVER be overly concerned about death threats, being followed, or about gang stalking events, it will simply make you wax paranoid, and be seen as such. The people who engage in PCT would simply kill you, not threaten you, if they wanted you dead. Unless a threat was quite specific and included a warning that you should do or not do something, ‘or else’ vividly described, it has no basis in any real threat. If you get a threat with such a basis, that basis must represent a clear and present danger to THEM, in order to be valid. Telling you to stop being an activist, or stop investigating why you are being targeted, does not count, unless perhaps, you have gotten to the point where you can CLEARLY identify and prove with legally useful smoking-gun caliber evidence the who, why, when, what and who of it. In such a case, you have the makings of a blackmail insurance policy which can not only counter the threat, but force capitulation and even remuneration for your troubles at their hands. That was how I ended my first targeting, and was offered $40,000 per my demand. It has become the model for all client help efforts ever since. Being followed or gang stalked is merely a jerk-your-chain tool that goes back to Stop, Think, Act. The only real danger is in giving into it. The only targeting which is a real threat is PCT based on electronics of one kind or another, chemical or biological assaults, physical abuses (i.e., rape, beating, accessing you while you sleep), and dirty tricks which impact finances, relationships, reputation, and the like;
  4. NEVER presume another TI, TI activist group or organization, or general Web resource to know what they are talking about regarding PCT or solutions, for the likelihood they have it right is very low. Take it with a grain of salt, and tuck it away for comparison to other resources. Books are a far better bet at getting at the straight dope. Older books will by now have a reputation establishing usefulness. Avoid newer books or other sources by anyone claiming to be an insider, ex intelligence operative, or other ‘expert,’ as they are likely providing disinformation to insure you continue to fight the wrong problems;
  5. NEVER hook up with another person, especially another TI. There are many reasons this is important advice, and I assure you that the risks you undertake with even a casual date or one night stand is significant. I see it play out again and again. Rare is the TI that can better their circumstance by not living alone, and a sexual adventure is far too easily a set up opportunity of one kind or another;
  6. NEVER pay money to anyone offering implant scans, ‘scientific’ testing, or new age solutions without EXTREME CARE; it is likely a scam, even if there are YouTubes or personal testimonies, the likelihood remains high. Research, research, research. Even if you actually did locate an implant by some method, the number of people able to have an implant removed can be counted on one hand; the medical industry will not cooperate. I have yet to see any positive results from testing services or new age approaches, but if you want to submit a chemical sample to an actual laboratory for chemical or spectrum analysis to find out what it is, that is worth the time and money;
  7. Avoid participating in poorly conceived TI activist efforts to outreach, or outreaching directly yourself. By poorly conceived, I mean an effort which does not heed the advice employed here. At best, such efforts defame and set back the TI movement and each person associated with it, labeling them as mental. Many of these efforts are designed and promoted by perps, and used as a kind of ‘evaluation survey,’ especially those asking you provide personal histories or statements. If legitimate, such statements will tend to seem crazy to anyone not already believing that targeting is real — adding another ‘crazy story’ to a stack of them will not change their minds.

 

Other facts to consider

The following may temper your views in seeking full understanding and formulating defenses. Simply keep them in mind when reasoning things through.

  1. Many perps are themselves victims of mind control, typically the worst kind, the Monarch/MK Ultra kind. They know not what they do, literally; they are programmable people based on multiple personalities which can be triggered at will. While some perps are psychopaths, these, are not, though they my be controlled to exhibit the same behavioral traits;
  2. You may be such a programmable person, yourself, and like them, not be aware. If such a person, and also targeted, you represent some form of ‘failure’ in the programming, and the targeting is designed to neutralize any damage you might cause to the program if you become fully aware of your true situation, which is a real possibility as you work through understanding and defensive efforts. The important and terrible truth is, that such a person will sabotage their own daily efforts in this regard, and make no progress whatsoever. Such a person will likely exhibit many additional symptoms as found in my book, MC Realities. Most notable among these is a question or belief they were targeted or abused as a child, or themselves have  abuser thoughts or have so abused. Should you come to suspect you are a programmable, you should contact me for special advice too complex for this forum;
  3. All PCT is Satanic in nature, origin, and intent. Your enemy is as forecast: Powers and Principalities, and there is scientific proof available. Therefore, your best ally is religious faith, and the best faith for the purpose is Christianity, and the best Christian Church (because it is acknowledged to hold closest to God’s Word in the original Greek and Hebrew translations) is the Wisconsin Synod of the Lutheran Church. There is a whole chapter in my book, MC Realities, which explains exactly why this is true in both practical and Biblical terms;
  4. You will hear it said all the time, that TIs fear they are being murdered, or that they have been murdered. THERE HAS NEVER been such a case. Being a TI can certainly mean to be suffering in great pain, and it may certainly to some, at times feel like it has the potential to kill. But thus far, the only known deaths of TIs have been from suicides or accidents, or natural causes such as old age or disease, according to official records. While it is true that there are ways to fake such deaths and such ways are known by our enemies… and it is true that some potentially deadly illnesses such as cancer may be caused by targeting… death is NEVER the goal. They invest perhaps a quarter-million dollars a month on a full-time TI. There is no point in killing off such an investment. So the only deaths which bother me are the suicides, because that kills not just the person, but effectively the soul, as that is the only unforgivable sin; a sin against the Holy Ghost. If you give in to it, you are surrendering to your enemy, Satan, not just the perps. I am in communication with literally dozens of persons who have professed to have been being murdered as far back as 1992 or so, and they are STILL HERE, some of them still making the claim from time to time. Only two out of 12,000 are known to have died, one of old age and disease, and the other in a traffic incident;
  5. There is no place one can go where targeting is not likely to follow within weeks to months, save one or two foreign countries. The only one of these that has been verified by multiple TIs, is Ecuador, which to me does not make sense, but it seems to be true, with three such instances reported to me personally from TIs I had vetted as legitimate TIs.

The Pitfalls of Presuming TIs are Schizophrenic


After working with over 12,000 persons coming forward for help with targeting over the last two plus decades, I’ve learned a good deal more than just found in my earlier books. There has never been a Targeted Individual who has not been accused of schizophrenia. While that can be true, it is often not true, and even when true, targeting may also exist. The issue must be dealt with head on, and with care, lest it become a stumbling block beyond cure.

by H. Michael Sweeney proparanoid.wordpress.com    proparanoid.net    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Updated March 1, 2017: General editing and additional commentary and color coding of text for improved clarity.
x
What you will get by reading this post…
• Targeting symptoms generally match schizophrenia symptoms;
• most people, especially professionals, automatically ssume schizophrenia;
• true or not, the possibility of schizophrenia should not be ignored;

• there are good and bad ways of addressing the problem.

First impressions DON’T count

When I’m first contacted by stalking victims for help as online consultant, the stories told me tend to border on what people unfamiliar with the subject would think impossible. The ‘natural’ conclusion, especially for professionals in health care, law enforcement, or governmental authorities such a person might turn to for help with their enemy and/or suffering… is that the person is suffering something in the realm of paranoia or schizophrenia. That is not always wise, but unfortunately, it is quite unavoidable, and for two reasons.

mkultra_page_001The first is that the symptoms of targeting are by and large identical to those of schizophrenic episodes. Hearing voices or seeing things no one else does are perhaps the most well known examples, all things that can be simulated with advanced electronics; voice to skull can be achieved by multiple methods; Sound Canons and other tricks can create otherwise unbelievable visual aberrations. But also, the general belief of claim that people are following, spying, or threatening, especially in numbers, is seen as a symptom. Enter gang stalking methodologies.

The second reason is less coincidental. People simply don’t want to believe in the Boogeyman, especially officials and other professionals, because trying to deal with something they can’t see evidence of being true is beyond them. That is their failing, often a thing wrongly taught them in their training. Often, that training was crafted by people who helped develop targeting methodology, former CIA mind control scientists. This has been well documented in many books, some of which were written by retired CIA types, and as referenced in my own book on topic, MC Realities.

This is especially true of the DSM series of mental health manuals, because at one time and even currently in some cases, the history of heads of collegiate psychiatric departments and EVERY professional association to which a psychiatric professional could be member… as well as Industry watch dog or promotional organizations… can be traced back to the original CIA mind Control Experiments as CIA employed researchers. As they die off, new ones are recruited, and the false narrative… a ‘lunacy’ about lunacy, goes on.

When Congress investigated CIA (and other agencies) in the Church and Rockefeller Committee hearings in the 1970s, CIA officially (claimed*) they had already shut down such programs because (they claimed*) they did not work. They then quickly scattered the CIA scientists involved to form three kinds of groups:

a) institutional and professional groups which insisted MC did not exist, did not work, and that anyone thinking otherwise was mentally ill or, in the case of professionals, guilty of malfeasance or malpractice;

b) like groups which pretended to seek and ‘help’ victims of MC; and

c) into key positions of power and authority within the psychiatric professional associations (all of them), and collegiate Psych departments, where they not only taught the preferred view about mind control, but also helped to write the DSM series of ‘bibles’ used by shrinks in diagnosis/treatment.

*Claimed?

Ironically, the most notorious of group (b), above, was the Cult Awareness Network; CAN, which was consistently called upon by government to help ‘resolve’ crisis arising involving the so-called ‘suicide cults.’ CAN has since taken over and operated by the Church of Scientology, seen by many as a mind control cult in its own right. This was a favorite area of CIA mind control experimentation, trying to find ways to get large numbers of people to kill themselves as a collective. Read Psychic Dictatorship in the U.S.A., by Alex Constantine, for a long list of such experiments. Alex, by the way, was targeted for his writings, and went into hiding for a time. The other purpose of group (b) is to recapture persons who may have escaped mind control projects or who, due to mental issues, may become good subjects as training fodder, and brought into such projects.

What makes it ironic is that CAN advice and helps (pre Scientology) consistently resulted in the mass deaths of those being helped, examples being WACO and JONESTOWN. In both cases, the CIA plants within the groups ‘miraculously,’ managed to survive unharmed, and quite by ‘coincidence,’ the leaders and core members of those groups had previously been in spheres of influence of MC scientists in group (c), above. More could be said about such things, and have been, in MC Realities, Alex’s book, and others. But starker proofs such claims are false exist.

In my first book, The Professional Paranoid, I cited in the Appendix some 400 CIA fronts and influenced organizations which predominantly predated the Church/Rockefeller hearings. Almost exactly half of those had to do with Mind Control. CIA book vanished that book by buying all available copies from suppliers, having one of their own publishing fronts invest in my publisher with the proviso my book not be reprinted, and then ‘selling’ used copies for nearly ten times their face value so that people who had copies would sell theirs for a bit less… and then buying all those up, as well. It is a common CIA trick.

But my publisher was a good guy and he returned the book rights to me, something CIA had failed to think of specifying he not do. So I now effectively ‘self publish’ using print on demand for hard copy (through paranoiapublishing.com), and ebook versions directly through me (proparanoidgroup at gmail com. This makes it impossible to book vanish. Subsequently, in my third book in the Professional Paranoid Series, The Defensive Field Guide, I included 1,000 CIA fronts, almost all of the additions coming into existence post Church/Rockefeller hearings. Guess what? STILL — over half of them were/are involved in mind control related operations. CIA lied to Congress.

The unexpected result of my books was that they sponsored a flood of requests for help from victims of targeting. The overwhelming majority of such requests were from people suffering some form of mind control technology or methodology, most notably, organized ‘gang’ stalking, and/or Directed Energy Weapons (DEW). As result, I felt obliged to attempt to offer professional online consulting services to attempt to help such persons.

This is a very difficult thing to undertake for more reasons than just the communications issues forced by being limited to dialogs at distance without more personal on site direct involvement. While I also offered direct intervention services, they were always beyond the financial ability of the victims; mind control is never worked upon the wealthy unless they first attack and destroy the victim’s financial underpinnings.

Early on in offering such helps, and even in trying to sell my books in the first place, the issue of mental health questions loomed large due the Boogyman Disbelief Syndrome. BDS is a form of mental illness (not found in the DSM, of course) which causes professionals to ignore facts in the Congressional Record, scientific papers, patents, and books by endless authorities on topic, and insist therefore that persons claiming to be targeted are ALWAYS mentally ill, per the DSM bible they worship; they live and work as if in a cult, themselves victims of a form of mind control, the very thing they deny exists.

I have personal proofs I can speak to, as well. I ask professionals who think only schizophrenia possible to explain how it is that, with my defensive and offensive tactical advice, it is possible that some TIs have obtained the ultimate relief? By that, I mean total ending of their problem in ways which prove it was not a mental issue. The proof being in the form of paying huge sums of money by those guilty of targeting as retribution, and/or providing ‘dream jobs,’ record contracts or book deals, and so forth.

The Elephant in the room

dsm-grows

The Bibles of the ‘Psychiatric Cult’

That unhappy irony aside, Virtually ever TI, if telling their story in full, will make claims they assume to be fact which seem impossible to the listener, especially if unfamiliar with the topic. After thousands of such stories, even I can still be surprised. As stated, the natural conclusion is some form of mental defect in need of professional care. Especially if the listener is a psychiatric professional; the DSM tells them what to believe true — that schizophrenia is the only possible cause for targeting claims.

It was therefor proper that I early on advised that some form of schizophrenia or paranoiac affliction must always be considered a possibility. However, I also told clients that EVEN IF TRUE, it did NOT mean the person was not ALSO targeted, something no psychiatrist seems able to ever consider possible. In fact, that TI circumstance is actually quite common in my decades of experience of working with TIs. I therefore chose by policy to ignore any and all clues of potential mental health in any decision to proceed to offer helps. The only SAFE presumption by ANYONE professionally offering help is that targeting must be considered and investigated. To do less could leave one legally liable.

One additional reason to so proceed exists, and it is unique to true targeted persons. One of the primary goals of targeting is to reduce them to a political, social, and financial zero, and the main method employed is to make them LOOK insane, as quickly as possible. One way to do that is to mislead the victim into believing things true, which are untrue. Therefore, any general belief expressed by a TI which seems unbelievable may be explained by this fact, and is yet one more reason not to dismiss the claims as baseless; they are in fact, mere symptoms of targeting as much as of potential schizophrenia.

There are countless ways this can be done, and two key benefits are derived by the tactic. The first is that the implication of insanity is achieved, which leads to denial of helps even from loved ones. Destruction of personal relationships and other help resources is also a primary goal. The second is that the TI will end up fighting a non existent problem, and in making no headway, more quickly succumb to giving into feelings of defeat, breaking their will to resist. IT IS A TRAP, one I never allow a victim to fall into.

I have, therefore, never turned someone away regardless of how much it appeared their problem was mental. For one thing, it was quite often found true in time that persons with various mental issues were (and are) deliberately selected for targeting because of that fact, especially if the purpose of targeting is training exercises; any mistakes that might end up involving Police will be immediately dismissed on that same ‘presumptive’ basis. So it is absolutely possible that targeting and mental health issues are present in a given TI’s case.

cover-1.jpgSo I always tried to early on include dialog on how to best address the possibility of schizophrenia and PROVE the answer, whatever it really was, one way or the other. If TRUE, it would be best to get treatment and resolve that issue, first. RARELY is anyone willing to take that advice; they find the prospect too scary, because of the history of psychiatry being rather prone to forced institutionalization with horrific results (as exemplified in One Flew Over the Cuckoo’s Nest). Such hesitance has not seemed to matter that much, because after working with someone for a while, I am eventually able to discern the truth for myself, and advise such help is their only chance at relief.

I will state for the record, quite contrary to DSM assertions, that about only about 1 in every 5 or 6 do suffer schizophrenia and are not truly targeted. I would then so advise, offering as many factual reasons as I hoped would be logically seen as true and valid to the client. Once in a while, they would see the truth, and act on it, but not often enough. A lesser number have been judged both schizophrenic and were also found to be targeted. The remainder were simply targeted, and merely seemed schizophrenic outwardly by third parties. They might additionally be seen as slowly being driven into a naturally resulting state of paranoiac behaviors. That is not the same as being mentally ill, certainly not the same as being schizophrenic; it is simply survival instincts gone overboard in an appropriate effort at self defense. That, I can work with on my own, and it takes no psychiatric skills, only logic.

The nature of the Elephant in the room

It is important to understand: Schizophrenia is not some shameful state of insanity such as people tend to think it. It is simply (rather overstated) a chemical imbalance in the brain which can often be addressed with drugs and good council. Yes, there are significant pitfalls in the treatment process; there is a level of quackery to the ‘science’ behind it, and that results in a hard path typically full of side effects from trying to find the right med and dose level. The patient becomes a Guinea Pig. When the ‘science’ can consider the varied physiology of individual patients and come up with the right med and dose the first time, THEN, and only then will it actually be science, IMO.

But there is a significant difference between privately seeking help and being forced into it by ‘the system.’ The latter can sometimes result in forced treatment to the point of creating a ‘cured’ human vegetable who cannot function on their own, essentially institutionalized for life. The former is considerably safer and far less likely to have an unhappy ending, the worst possible result being an unflattering written record and a period of unpleasant side effects which soon enough wear off. A good result, however, would be a written clean bill of mental health; a well deserved middle finger upraised to all who doubted.

abmToo, some care must be taken to insure that the meds do not lead to suicidal thoughts without care to prevent actualization; many psychotropic treatments do have such side effects upon withdrawal from use, some upon use. I know of this and other unpleasant side effects first hand, as I and several members of my family have been put on such medications, which are often used for more than mental issues.

Fortunately, there are ways to seek voluntary helps with reduced risks — but which are situation dependent and cannot therefore be well described, here. But schizophrenia can also be addressed with WILL POWER, though a rare eventuality. This is seen in the movie, A Beautiful Mind, a true story. In fact, watching it led me to develop an all new technique useful in reducing the actual effects of various targeting methods, including DEW. I’m talking about reduction of targeting effects, such as pain and manipulations of mood, alertness, and mental acuity.

They can even work with non targeting issues, such as pain reduction for toothaches, burns, Diabetes, and other cause, or even to help neutralize tinnitus (encouraging, but as yet no results against voice to skull). While simple in method, they are difficult to master; akin to trying to become a Jedi Knight in descriptive processes. But some can make them work usefully to one degree or another. This, too, is beyond the ability of this Post to well address. Anyone wanting to know more may email me at proparanoidgroup at gmail com and ask for the Jedi papers.

The good fight

I write of all this, today, because I just received an email from a Man in a distant country I had been working with for a while. He was quite adamant about his stalking, and elements of it certainly were beyond anything possible in reality. But he did have the will to brave the process of professional care and did brave the treatment trial and error, and was actually cured. He wrote to thank me and put my mind at ease, a kind consideration on his part. The transformation in his life was so significant that it was clearly evidenced in his writing style and commentary. His very personality and mental prowess was restored.

It was extremely gratifying to hear of his victory, and see him restored to a normalcy, even though I could take no credit. I wish I could get away with saying all TIs were schizophrenic, and that such treatment was the only solution (the official shrink view); it would have saved me decades of unhappy dialogs and less than perfect results. If it were true, and if victims would be willing to undergo treatment because there were no dangers in doing so, it would be a far more perfect World. But sadly, such a World view would be delusional: exactly as embraced by most professional psychiatrists, today.

I complimented him on his bravery for undertaking that hard road, and for enduring the clumsy treatment process which eventually leads to a cure, or eventually illustrates by lack of cure, that schizophrenia is not present. Getting a piece of paper from a Doctor that treatment had no effect is useful evidence to a TI. EITHER RESULT is a win win, even where actual targeting is present along with mental disorder. Where the victim can eliminate those things imagined, they can better focus on defense and attempts to prove those things which remain and are real. Perps will flee in the face of exposure. The trick is actually being in a position to confront them with that possibility, a matter which dealing only with reality can afford.

It cannot be done by struggling against imagined enemy tactics and methods, regardless of if imagined through chemical imbalance, or imagined due to deliberately fostered false clues. “A mind is a terrible thing to waste,” but that is exactly what mind control seeks to achieve. A TI must above all else, therefore, take any and ALL steps necessary to safe guard the health of their own mind. Free Will, the gift of God, is as precious as the gift of His Grace and of life, itself. These things are a TI’s best weapons of defense and offense. I have a whole chapter in my book on exactly how that is true; Religion and MC. This, too, is available as a free .pdf on request.

The right use of Free Will (righteousness = right use ness) might just include ‘willing’ one’s self to brave confrontation with that Elephant in the room. Clearly, it will involve other battles, as well. Never is it an easy path, and even where victories are gained, it is more often true than not, that total escape is not possible. Some break free, but all who properly resist can at least better their circumstances well enough that they can claim victory, and as a survivor, survive what targeting remains as more a nuisance than a life-long debilitating experience.

Is this not what someone with a physical handicap or long-term debilitating health issue must do, if to survive? Targeting is no different a thing, except that it is forced upon the TI by outside forces for evil cause, quite Satanic at its core. It is, therefore, a spiritual handicap, more than physical or mental, if rightly viewed; it is a war for the spirit and free will of the victim, that very gift from God. Therefore, God is indeed the best ally.

I hope this one example gives hope to those in dire need. That, too, would be a credit to the man who wrote me, a kind of legacy or testimony which hopefully leads others to dare to do the same. Just take care, if that includes you. The path is not easy to see, and there are brambles to each side which must be avoided. While I can no longer offer actual paid consulting services, I do remain available for guidance and providing answers to simple questions which do not involve significant situational analysis (proparanoidgroup at gmail com). I answer all inquiries in person.

Terrorist H. Michael Sweeney’s RAP Sheet


OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 

What makes you a terrorist when you live in a Police State?

Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.

One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).

OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.

hmswanted

R.A.P. Sheet, H.Michael Sweeney

1976  Wire Tapping, 2 counts, charges dropped for insufficient evidence

1980  Embezzling, charges dropped after resignation from company

1983  Counterfeiting, Drug Smuggling, sentenced

1984  Wire Tapping, charges dropped for insufficient evidence

1985  Shoplifting, 4 counts, sentenced

1987  Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution

1988  Wire Fraud, 3 counts, sentenced

1988  Smuggling, 2 counts (bioweapons, diamonds), sentenced

1990  Espionage, Interception of Electronic Communications, charges dropped by NSA intervention

1991  Bank Robbery, 4 counts, sentenced

1991  Wire Tapping, 4 counts, cold case due to flight to avoid prosecution

1992  Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,

            cold case due to flight to avoid prosecution

1993  Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution

1994  Wire Tapping, cold case due to flight to avoid prosecution

1994  Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped

1996  Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution

1998  Wire Tapping, Stalking, cold case due to flight to avoid prosecution

1998  Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced

1999  Possession of Controlled Substance with Intent to Sell, sentenced

2001  Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention

2002  Terrorism, 4 counts, cold case due to flight to avoid prosecution

2004  Bioterrorism, case closed due to lack of evidence

2004  Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered

2016  Armed Robbery, 2 counts, cold case due to flight to avoid prosecution

2016  Bank Robbery, cold case due to flight to avoid prosecution

 

Summary Judgement

By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.

Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.

So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.

All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).

We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.

OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.

FCC to Kill Local Television as We Know It


Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

FTC to Kill Local Television as We Know It

From infinite unknown.net on Obama approved NSA spying on Internet (click)

From infinite unknown.net on Obama approved NSA spying on Internet (click)

Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:

  1. Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
  2. All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
  3. Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
  4. Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
  5. All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
  6. Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
  7. Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.

 

from International Liberty's page on foibles of FCC's 'Net Neutrality' (click)

from International Liberty’s page on foibles of FCC’s ‘Net Neutrality’ (click)

It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…

It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.

Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.

Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.

Take a look at FCC’s official page, here.

Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!

 

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View


The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages;
•  that there are specific ties between Cheops and the goal of the New World Order;
• that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.

Are mass shootings by intelligent design?

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Is there a mass shooting conspiracy?

Mysteries of Cheops

In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.

First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.

One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.

Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’

ONE Egyptian Inch = 1 Year of History. From gizapyramid.com (click).

Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:

 Do the pyramids really relate the entire history of the World from beginning to end?

Shootings depict Cheops

Pyramid

Left: perspective transparent view; Right: inner view of interior passages. Remarkably, it took only 9 shooting lines, and 14 shootings, to depict the pyramid and passages. However, 5 shootings stand alone (not on lines), meaning 9 are, giving us again the magical 99/18 result.

As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles.  Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.

Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).

Cheops!

As the satellite view is at a an angle, the ‘center’ is based on the base, not the peak.

The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there  — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence.  The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.

Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.

 Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?

How much is a Royal Cubit, anyway?

It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.

But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…

By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!

Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor.  I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.

As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)

Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.

Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.

Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.

But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper.  Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…

These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:

SubPass

The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.

The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:

Chamber

It is hoped that it is not intended that this nuclear facility suffer a China Syndrome disaster such as seen at Fukushima, in order to render the ‘pit’ real on Earth in a hellish fashion.

The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.

Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.

I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.

 What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?

The European point of view

EuroAt right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:

At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).

It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.

The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.

Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?

Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.

Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?

 What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?

Go back to Introduction

Go back to Proof SevenShootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Go to Proof NineShooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart


Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines can be extended to a single spot on the other side of the World;
•  that spot is the Great Pyramid, Cheops;
•  that the lines are exactly 500 miles apart at a given point and form the same angle of arc.

Are mass shootings by intelligent design?

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Is there a mass shooting conspiracy?

The last proof resulted in some negative commentaries to group posts announcing its availability, all based on disbelief in the postulations advanced. This requires me to repeat myself: It does not matter what you or I believe, it only matters what the architects of mass shootings believe. Now, in this post, we start to examine the symbolism of Cheops and its ties to the shootings, which is also about what THEY believe. But first, I owe readers of Proof Six an explanation about the relevance of the ‘orange lines’ to select purple lines of the satanic baphomets and green lines of the Masonic emblems discussed as tying directly tie to Proof Seven in an unusual manner. So here we go, referencing the image below…

The orange lines are the multiple lines to Cheops this post is all about, of course, but those lines by and large pass through Europe using what is known as the Polar Route on their way to Egypt; the shortest, most direct route, despite the fact that in the movies they always depict planes flying East over the Atlantic to get to either Europe or the Middle East, or the other way ’round if going to the U.S. This is why, for instance, Iran Contra gun running used a stopover in Denmark and other Euro sites on their way to Iran, something which at first didn’t make sense to me when I learned of it.

The purple and green guidelines used in finding and plotting the baphomets and emblems also go to Europe, and end up doing something the bulk of the orange lines ALSO do: they just happen by ‘coincidence’ to pass through at least one, but more often, MULTIPLE ancient Illuminati and Knights Templar castles and other properties employed in their conspiratorial affairs, including some more modern facilities, and even Adam Weishaupt’s birthplace. He, of course, was the founder of the Illuminati, and a high Mason, and the Templars were the folks who evolved eventually to become the Freemasons we have today, as outlined in my book, MC Realities. There is one other line which does this, which is a red line created from a perfect isosceles triangle from Proof Three, which is the best example of ties to the modern Illuminati, as well as ancient, but also Cheops as it also directly intersects with the famous glass pyramid at the Louvre Museum in Paris.

There are other indications these lines and their relationships with Illuminati and Templars is tied to Cheops, in that some of the lines continue past Europe to the Middle East to find Templar sites, there, and two others, one each from a baphomet and an emblem, go directly to Cheops as if an orange line. It is interesting to note further, that these two are extremely close to the second orange line in from either side of the six orange lines; uniformity. Take a look: each white arrow indicates a line of interest which ties to the Templars or Illuminati. The ‘houses’ represent Templar locations (those icons refuse to float accurately over their respective sites at this viewing altitude), and the harder to see red dots are Illuminati, save Weishaupt’s birthplace, which is well marked. There are 18 lines in all, our magic number which equates to 666 in occult terms, only one of which (orange) does not find a Templar or Illuminati site, but we are talking about locations which in many cases have been lost through the centuries and, likely, it really does do so, but we simply have no such knowledge, today. The modern day Illuminati, however, WOULD know. The line certainly passes through territories where such properties are otherwise existent (not all sites are shown, only those which are intersected by lines).

pastpaths

Cheops I had previously been aware of the importance of Cheops to Masonic and Satanic histories, some more tenuous or doubtful than others, but all generally of a mutually supportive nature. If one reads the Masonic Bible, Morals and Dogma, it is clear that the leadership of the organization at the higher levels, is Satanic in its beliefs, practices, and tactical applications, and that all things of Ancient Egyptian lore play into their belief structures and lore. To Masons, especially, there is significance in the Pyramid, and thereby, also to Satanism.

Yet one can find other resources which state the Pyramid is outright tied to Satanism in one way or another, both inclusive and exclusive of Masonic ties, which came later in history. It is a Chicken or Egg question, or sorts, depending on the factoid being considered, but we need not answer those questions; our concerns are valid regardless of the answer. So when I noticed that some shooting lines seemed to angle off toward what I knew to be the ‘polar route’ to Egypt. I sought to verify, and was immediately proven correct. In the image above, find six orange lines which all meet precisely at the peak of Cheops a third-way around the World. They are all drawn at the same degree of angular separation (about 7.5 degrees).

At a given point in the map, in America, they are all exactly 500 miles apart, and as this image shows, they relate to shootings as they go. To date, only one (left most) has no useful shooting along its path to make the claim, but that does not mean there will not be in the future, and so, it is included. It may prove a means of predicting and even preventing a shooting. CHEOPS ALIGNMENTS x 6 There is no significance in the 500 number — at any given point, the lines are equidistant by some measure, I just chose a point where it produced a round number.

However, as research continued, I learned some things which would seem to make that a more important point. In the image below, this is revealed, and in the doing, we see also how the shootings themselves tie to the lines in important ways. More than this, the actual measurements once more reveal magical use of numbers in the occult manner. We should talk about accuracy. Given the great distance these lines must travel (35 million feet or more), the worst accuracy of these key lines is typically less than .05 degrees of arc (dependent upon Google Earth limitations as discussed early in this posting series), or some 15,000 feet at measure point. These work out to a maximum error of .007% and .0004%, respectively. I’m good enough with that to cite it here as proof of intent, given that the architects of mass shootings likely used the same tools, as I. There has, after all, already been revealed in prior Proofs several clues that such is likely the case.

cheopsUSA

Here we see some 440 plus mass shootings plotted along with the six orange lines from Cheops. The three green and three red lines are for measurement purposes, and require some dialog in order to appreciate the ‘craftmanship’ employed by the architects; a kind of confirmation this is no random outcome. The Meridianal (vertical) circumference of the Earth varies depending on where measured, but the average is 40,008 Km. This means that the point where the orange lines are furthest apart is some 10,000 Km distant from Cheops. This spot is found at the middle green line, and the measure there is essentially 2,525 miles.

This is confirmed in the red line between adjacent orange lines which measures 505 miles.  The other two lines are the points where 500 miles between, is found, for 2,500 miles total separation, there. EACH OF THE THREE HAS AT LEAST THREE SHOOTINGS ALONG ITS PATH. These numbers prove interesting, and thus I also elected to measure the diagonal (vertical red) and ‘hight’ (red along the orange line’s path) of a given rectangle formed by these lines. The vertical line, which happens to be North corrected for magnetic declination, a trait seen time and again in the various alignments of Satanic and Masonic symbols in the prior Proof, measures 777, a magical triplet. The height measures 606 miles. More interesting numbers.

Take a look (numbers are rounded unless otherwise stated, and reflect allowances for measurement errors introduced by Google Earth as previously mentioned): Note: you may wish to review the sidebar post on Magic Numbers before continuing. Because… 500 Miles = a palindromic 434 nautical, which sums in pairs to 77; 777 is not only a magical triplet, but forms by summing in twos (1414) the inverse palindromes 141 and 414, which sum together to form the triplet 555, and equals 675 nautical, which sums to 18, and 1250.46 Km, which sums to 18 by threes; 505 and 606 are both palindromes, of course. And about 2525, divide it by 505, and it goes exactly 5 times. 505 + 606 = the double doublet 1111 (a quad) 500 x 505 = 252500, which sums to the doublet 77; 500 x 606 = 303000, a palindrome times 1,000; 505 x 606 = 306030, a palindrome times 10 which sums in threes to 99, which is a code number for 666 just as is 18; 306030 also = 492508 Km, which sums to form the inverse palindromes 151 and 515; and 606 x 777 = 470862 which is divisible by 18 2,159 times, and the grandaddy 666, 707 times.

So we end up with 505, 606, and 707 palindromes, and the triplets 555, 666, and 777. 505 squared = 255025, which sums by twos to the palindrome 757; 606 squared  = 367236, which sums to the the triplet 999, a code number for 666 (upside down); it also divides by 18 to provide the palindrome 20402; 777 squared = 603729, which can produce 999 by summing by 3, 2, 1 digits consecutively, a bit unusual; We can’t easily find the area by simply multiplying 606 x the top or bottom, because they are different. We can do that with both and then average the result. This yields 303000, a palindrome times 1000, and 306030, a palindrome x 10. The total of the two  sums to 609360, sums to the palindrome 6116, and which divided by two = 304680. So now we know the area, which is 1680 sq. miles more than the smaller of the two, and that much less than the larger, of course. 1680 = 2704 Km, which not only sums to 13, but is divisible by 13 208 times.

The orange lines in detail

In the last Proof, we found the orange lines tied usefully to the layout of the four baphomets and Masonic emblems. Here, lets relate them more directly to the actual shootings which were also part and parcel of those relationships. The first lines at image left does NOT actually line up with anything, YET. It is presumed they will eventually line up with a shooting and may be useful in prediction of same, as there are very few communities in its path with logical targets which fit with other predictive factors. But I will not state these as our paranoid government tends to make anyone predicting such violence based on ANY criteria as the only ‘terrorist’ or ‘suspect’  in question. They tend to lock down such locations and charge the person who gave the warning with criminal intent of one sort or another, or act harshly against them in some way. Apparently, ‘See Something, Say Something,’ is a trap, and considered a crime. I know that at least twice that I reported terrorist activities, they did nothing about the report other than to harass me and try to cost me my job.

The next line is perhaps the most dramatic in terms of accuracy and alignment. It bisects with extreme accuracy two shooting events, even a third within Google Earth dictated error limits. The third also has three shootings within accuracy limits, two of which almost meet doorway-to-doorway accuracy.That line also passes through the Denver International Airport and quite near to a man-made earthen Ziggurat (stepped) Pyramid thought by many conspiracy theorists to be a D.U.M.B. (Deep Underground Military Base). The site claims to be a landfill, albeit the highest and fastest growing of its kind by far, if true.

It is also true that in its current state, it only appears to be a Pyramid in three of the four sides, the fourth being the area where ‘fill’ is taking place at this time. The next line features the sloppiest, worst-case error with two shooting points in its path. The larger error does not dissuade me, because both are quite equally distant from the line on opposite sides of the line (the line cleanly centers between them). There is additionally a business, Pyramid Foods, almost directly on the line near the Bartlesville HS shooting plot of that line. The next line also sports two shootings, one of which is quite near Meridian, MS; Cheops is itself a similar distance from Meridian, Egypt (a neighborhood name also used in several business names, there). The final Cheops line merely intersects within 1,000 feet of a single shooting event. This is near King’s Highway, and Cheops is a King’s tomb. Thus all the lines currently aligned with shooting points, are several are also aligned with something having to do with a Pyramid. This yields yet more consistency, but feel free to presume it coincidence, if you must. What does Cheops have to do with mass shootings?

Why Pyramid?

Beyond the earlier comments about why Cheops is important to Masons and Satan worshipers, there are a few other things which should be mentioned. One has to do with the construction of the Pyramid, which many historians think drove the establishment of at least some of the ancient Egyptian’s measurement system. What is interesting about that, as casually mentioned earlier in this series, is that as history progressed, their system became in various ways the bases for both the English and Metric systems, as well as the system employed in America. It is alleged that Masons (Templars) were the driving force behind this, in part, to insure or play to the mysteries of magic numbers.

One of the few 3-D cutaway views on the Web from ancient-egypt.org (click)

So do not be surprised then, if the next post, I tell you that there is not at least one measurement at Cheops which is duplicated in shooting lines here in America which depict the same part of a pyramid in a 3-D view, but using different increments and a different scale (think miles for inches, for example). I’m still working on verification of a list of suspect instances, but it certainly seems the case. This would NOT be possible if there was not some basic underlying ‘magic’ built into both measuring systems with respect to conversions. But the real thing of interest about Cheops, here, is its lore.

Many learned researchers have studied the Pyramids endlessly to formulate many different theories relating to its design, how it was constructed, what its purpose was, and so forth. Many of their findings are controversial, but few are invalidated by the work of others, but might remain rightly in the realm of speculation, or ‘lore.’ Among these are two which would logically be of interest to a Warlock or high Mason (sometimes, the same thing).

The first involves the inner passageways of Cheops. We know these are important to the architects of shootings because, as we will see in the next Proof, they are faithfully duplicated in the 3-D depiction of Cheops by use of shooting lines and shootings. The reason why would seem to be in the lore, which according to some, says that these passages are a kind of history of the World being depicted from creation to its destruction. They actually make a very good case for this, and my own conclusions would tend to agree there is something to the notion, at least symbolically, if not accurately to the year. The claim was, that each Egyptian inch represented one year of history, a thing which seems to be true at least for specific historical events used as benchmarks.

If, therefore, the need to seat the Antichrist in support of end time prophesies requires taking away guns in America to allow the formation of the North American Union, then our architects, being wise in the magic and lore of Cheops and the like, would most likely incorporate as much of that magic into their plans as they could manage. The second involves what is called Pyramid Power in a book by the same name written by Max Toth, which is as good a reference as any of like conent summarizing the lore of Cheops, including the inches for years theory. If even half of the claims within were true (and I have verified at least two of the main claims in my own experiments), that is one more reason a Warlock would wish to incorporate pyramids into any conspiracy aimed at seating the Antichrist. But again let me say, it does not matter what you or I believe about such lore, it only matters what THEY believe.

Go back to Introduction

Go back to Proof SixShootings Also Relate or Depict Masonic and Satanic symbols

Go to Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Crime Series: Ten Unexpected Proofs ‘Random’ Mass Shootings are by Intelligent Design


Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this multi-part posting series…

•  there are 10 interlocking proofs that mass shootings are not random;
•  they include various kinds of patterns, visible and unseen, and even coded information;
•  that the pattern predicts itself, and understanding may therefore help stop the murder;
•  that the codes and clues seem to be like signatures identifying the architects.

Are mass shootings by intelligent design?

Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.

One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…

In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.

But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to  consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?

Area all mass shooters psycho?

On suspending belief structures

mythbust

Dormer was not quite a ‘Mass Shooter’ incident, at least not at a single location/time. But the affair highlights the problem of accepting ‘random’ as the right word to apply to shootings when there are so many problems with the official story. CLICK to learn about why many people think him just another shooting patsy.

I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.

This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece.  That’s what it is, actually, minus the fiction component.

You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.

If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.

Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.

Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.

I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.

The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:

a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;

b) the false flag downing of the World Trade Center by civilian passenger jets which;

c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…

d) a false flag nuclear attack on Charleston, S.C. and Portland Oregon (the later of which I have already thwarted, it seems – see middle of my home page), and more to the point…

e) MASS SHOOTINGS.

Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.

So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.

This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error.  Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.

Are mass shootings are by intelligent design?

The Investigation

Jason Bourne… though fictional, is based on real-World programmable assassins. Do you suppose CIA or anyone else would not find something useful to do with failures in such programs? Might they not make excellent disposable patsies? Image/film: http://www.imdb.com/title/tt0372183/

Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern.  But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?

I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place.  The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:

1)    That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;

2)    That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;

3)    That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.

All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.

Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.

Sidebar PostOn Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings ­­— those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design.  This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.

Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.

Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.

Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.

The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.

People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.

I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.

Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.

This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.

What are the ten proofs of a mass shooter conspiracy?

The Ten Proofs in review…

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;

Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning. 

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.
 

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;

Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;

Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.

Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study Proofs

Two examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other.
Why are mass shootings on the rise?

Are you ready of this? Buckle up!

So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?

Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.

By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.

Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.

I will demand the same of naysayers.

Go to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Side Bar: On on Programmable People

 

How Social Network Trolls Target, Track, and Psychologically Profile You


How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.

What is a Web Troll?

by H. Michael Sweeney

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How does being a web troll work?

UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively  while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.

Are you being targeted by online government trolls

How Social Network Trolls Target, Track, and Psychologically Profile You

Reading this post you will learn…

•  That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU;
•  That there are troll profiling and tracking tools or methods which can be recognized;
•  That there are ways to protect yourself without drawing more unwanted attention; 
•  That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting.
Is social media infiltrated by government trolls?

Government and Commercial Trolls

Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.

These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.

The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.

Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.

And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.

How can you spot a social media troll?

Differentiating an innocent graphic from a potential spy tool…

There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.

So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.

Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic.  YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:

1146548_664505843574765_1740298350_n

This is an example of a Troll-generated chain letter designed to find out your religious views, and who among your friends is of like mind. Note the guilt factor in the last sentence, and no true traditional Christian message. Note also the dark aberration, a visual flaw above the numeral 9 of 97%.

1005209_10201199164735487_1499677395_n

This is an example of a Troll-generated chain letter designed to find out more about your true close friends, as opposed to casual Network contacts you don’t personally know. Again, note the visual flaws in the slightly darker ‘blur’ areas about the letters… you may need to zoom in. This phenomenon is common in such messages, creating a pool of pixels useful in manipulations.

So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?

When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.

Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”

Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.

Are social media trolls sociopaths or psychopaths?

More Direct Trolls; Psyops and Sociopaths

The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.

Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.

Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.

But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?

Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.

Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).

It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.

Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.

This is also true of the sociopathic/psychopathic ‘cause’ trolls.

Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.

Can trolls lead to real-world targeting?

Dangerous escalations; why we dare not ignore trolls

The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.

And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.

But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’

What should I do if I encounter a social media troll?

What to do with a Troll

I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.

But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.

My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.

Are social media trolls dangerous?

Conclusion

Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it.  The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.

And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.

It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.

Gun Shops, Grocers, Other Retailers Key to Disaster Survival


When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.

How do I protect my business in a disaster?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can gun shop owners do to protect against gun consfication?

The Threat to Business Property is significant in a disaster…

Korean shop owners (rooftop) defend shops during LA Riots to augment or supplant Law Enforcement (click for riot details)

In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.

But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.

There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.

And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…

What will happen to gun shops in a FEMA declared emergency?

Partnering with Family Collectives

The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.

The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.

My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.

In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny.  We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.

We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.

Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.

How can we prevent government confiscation of our business assets in a declared emergency?

Making it work for all concerned

I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property.  Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.

Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.

I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.

Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.

From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.

Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military.  I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.

Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.

In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.

How can I protect my business as well as my family in a disaster?

Revolt Against Mongressanto: GMO Crops Torched in America


Though a controlled media is suppressing the story, 40 tons of GMO crops were torched, prompting an FBI investigation. We The People do NOT WANT GMO, and if the Monsanto Congress does not watch their step, arson will become outright violence, and from there, even lead to revolution.

Why were sugar beets set on fire in Oregon?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Who is Oregonians for Food and Shelter?

Update June 22, 2013: Additional research reveals some interesting things about the who and why behind the $10K reward offered for the beet burners… at document end.

Are Monsanto and Syngenta GMO criminals?

What you will learn reading this post…

  • People are taking the law into their own hands to kill GMO production[
  • There is an apparent media blackout, even on the Web;
  • The government is ramping up for what may end up being another WACO/Ruby Ridge standoff;
  • We may be looking at the Boston Tea Party of 2012 just before the next American Revolution.

Who is the earth liberation front?

Rebirth of the early Earth Liberation Front?

I Can’t Believe I’m the FIRST and ONLY one to report this on the Web.

Our new Boston Tea Party?

Our new Boston Tea Party?

NOT ONE MEDIA OUTLET outside of local circles has dared to mention it, perhaps because government fears that if the public learns that other people are getting fighting mad (literally), they might join in, and become an actual revolution. It was only reported locally live on KXL Radio and echoed by the Oregonian, where the ONLY Web mention exists, hard to find because the headline wording is carefully avoids the most likely keywords for a search — took me rather a while to find it. Here’s the scoop — PASS IT ON!

40 Tons of GMO Sugar Beets were set ablaze in Eastern Oregon, yesterday. FORTY TONS — the entire acreage of two full fields of crops IN THE GROUND were set ablaze over a THREE NIGHT PERIOD OF TIME. That means ARSON. And I have to say I am cheering! The only way could feel better about it is if I had dared to do it myself — which to be clear, I would not: I don’t look good in prison orange, and would be too worried about possible loss of life if things went terribly wrong.

Evidence is that 6,500 plants were destroyed BY HAND, ONE PLANT AT A TIME. That, in turn, implies A LOT OF PEOPLE were involved: would you want to stick around once a fire was going and wait to be discovered? No, someone (many someones) probably wanted to move as quickly as possible. WE ARE TALKING ABOUT A MOVEMENT, a kind of ORGANIZED REVOLT — and this is exactly the kind of retribution I’ve warned was coming; when lawmakers and corporations refuse to honor the Constitution and instead engage in ‘legalized’ criminal acts such as enabled by theMonsanto Protection Act.’

This is all shades of… well, the BOSTON TEA PARTY. Instead of throwing tea into the harbor to protest taxes, someone was throwing flames onto crops in the ground to protest New World Order shenanigans. We are a long ways from Boston, but more recently we have the Earth Liberation Front, a group which also had its roots in Oregon (I love my State and our people; we have core beliefs and fight for them). The ELF, in 2000,  burned the offices of a GMO research project at the University of Michigan, a project funded by the Federal government and Monsanto at the time.

The ELF, or ‘Elves’ as they are sometimes called, is an ad-hoc group with its actual origins in the U.K. But forest mismanagement caused splinter cells to be established in Oregon, and subsequently, Michigan and elsewhere as new corporate wrongdoings became evident. Like the IRA, they have an official, public side, one not associated with criminal adventure, and instead focused on educating the public on the issues, such as the Gulf oil spill. They are a kind of militant Green Peace, perhaps.

But ELF cells normally come forward immediately to claim responsibility, because to them, its all about publicity to educate the public. Since there has been no statement, I’m deducing it is simply Oregon Farmers who have said, ‘Enough!’ Another clue that may be the case is that this comes on the heels (two weeks) of Japan’s rejection of the entire Oregon Wheat crop for the year (a tremendous financial blow because over 80% of Oregon Wheat is exported) because ONE report said ONE field was contaminated with at least ONE GMO plant.

The rightful fear is, because of pollination processes, once you introduce a GMO crop of a given variety ANYWHERE, the wind and insects will spread its genetic contamination to non GMO fields, and thereby ruin the ENTIRE INDUSTRY for a region. In fact, Oregon farmers have tendered a multi-billion dollar class action law suite against Monsanto, joining a long list of states doing so. Monsanto has experimented with GMO crops before they were approved in 16 states. They were supposedly all destroyed, but state after state is finding out the hard way, that Pandora’s box has been deliberately left open.

But while other governments in Europe and elsewhere are passing laws to ban GMO crops, and burning entire crops themselves, in America, our government is passing laws protecting Monsanto from legal repercussions, and therefore, it seems, farmers are forced to burn the crops, themselves. This means that where in other countries, citizens are being protected from corporate crimes, in America, citizens are forced to become ‘terrorists’ to survive. That’s how blatantly corrupt our corporate police state has become, I’m afraid.

Can GMO spark an armed revolution?

First Blow For the Revolution?

In this case, both fields belonged to the same Corporate Agricultural giant known for embracing GMO, though trying to do so quietly, another reason perhaps big media has kept the story from reaching the Internet. We are talking about Syngenta. Nowhere on their US Web site will you find mention of GMO, but that is exactly what the company is about. They have even lied publicly in writing on this issue with a public declaration. Yet their very corporate name shouts GMO.

But the FBI, and local media knows better (and now, you)… because apparently someone from the Syngenta operated farms mentioned the fact as a possible motive for the arson. This is a serious matter in many respects. It throws down the gauntlet and says, WE ARE MAD AS HELL AND ARE NOT GOING TO LET YOU GET AWAY WITH THIS BULLSHIT ANYMORE! But it also raises the stakes and put lives and property at risk, and if it goes wrong, could end up sparking an armed revolution.

Imagine the likely scenario: the FBI identifies a particular non GMO farmer as being participant and puts together a 100 man assault team to surround their homestead, land they’ve been farming for generations. What do you suppose would happen if they stood their ground? You would have another WACO standoff, another Ruby Ridge. Do you suppose that the other several dozen participants in the crop burning would stand by and let them pick them all off like that, one by one? I doubt it.

They would muster every rifle their families could carry, and call in farmers from adjacent counties, and likely be joined by some number of citizens from the local communities, and surround the FBI and other local authorities. They might even be joined by local Sheriffs, if not out of sympathetic understanding and general GMO angst, then in hopes of defusing the situation. I’m telling you, this can easily get out of hand.

And in a way, I’m hoping it does. Because I think WE NEED A DEFINITIVE EVENT to send a CLEAR MESSAGE and draw a line in the sand: NOT ONE INCH MORE — BACK OFF! It would rally the informed to action, stir the Sheeple to understanding, and FORCE THEM to take a side, lest they end up in a possible cross fire if shooting breaks out everywhere GMO crops and corporate properties exist, and their executives live.

Even though it could easily spark a full-scale revolution, I’m still for it. That threat is not lightweight, either — it is incredibly easy to start and carry out a successful revolution. I’d be tickled pink to live in America, once more, a country based on a social contract called the Constitution and Bill of Rights, where government was BY THE PEOPLE, FOR THE PEOPLE, of the people, and not a fascist police state in the making BY CORPORATIONS, FOR THE NEW WORLD ORDER.

GMO? Burn, baby, burn…

Mongressanto? You may just be next.

Who are Oregonians for Food and Shelter?

Update: The Who and Why of the $10,000 Reward

‘Oregonians’ for ‘Food and Shelter’ sounds like a charity that provides food and shelter, but that’s not right. Their Web site describes themselves in terms which, after thoughtful consideration, would leave you believing them a non profit NGO, a special interest group (SIG) of professionals seeking to educate their peers in the latest timber and agriculture technologies. Closer to the truth, is that they are a Political Action PAC, putting out their own Voter’s Guide, and involving themselves in political matters impacting timber and farming.

Their members are a who’s who of AG and Timber, but with a specific bent toward biotech… specific biotech. Their Boards and Chairs are well peppered with people from Monsanto, Syngenta, and other firms with a vested interest in GMO, and firms they do business with. In fact, there are even two firms represented who have had consensual dealings with Central Intelligence Agency fronts. One of these was harmless and related to fire-fighting, but the other (Portland General Electric) was tied to much darker matters, though I’m sure they were not quite aware of such details. But then, those same folks also went to bed with ENRON (also a CIA operation), didn’t they?

The OFS founder is one Terry L. Witt, who cites himself as a professional Manager of Non Profit Groups, as though you should go see him if you have one in need of management. Really? The Web site was founded in 1999. Within a few months, Terry was writing in support of Monsanto’s patent infringement suit against a farmer over GMO crop migration (contamination) such as faced by Oregon Wheat growers. It would not be the first time he would play hatchet man for GMO, additionally using op-ed in the Oregonian to disinform on behalf of (again) Monsanto.

Indeed, if you look at the one and only truly informational page at the Web site (despite the fact they list three topics to choose from – the other two have no links provided), the topic is… you guessed it; pro GMO. So what is the real agenda, again? But perhaps we should overlook this narrow view, because they do point out their Web site is still under construction. What?

Established in 1999, and still under construction? Could it be because the Web designer is (whois information) Troy, Terry’s son, operating out of their $700,000 home in Tigard? Hmmm. Troy has his own business (he is a photographer and ‘lead designer’ at a ‘design studio’), and his Web site is even more under construction: it consists ONLY of a logo (ergo, my use of quotes). There is not even a statement on being under construction since created in 2005.  “Focused Marketing, Messaging, and Design,” the logo claims.

This could be the trait of (choose one):

a) someone not very good at what they do;
b) a CIA front;
c) a corporate front for money laundering (e.g., payments from Monsanto);
d) a front or over billing a client (e.g., Monsanto);
e) a clever ploy to distract conspiracy theorists and waste blog reader’s time;
f) all of the above.

I’m sorry, but I come away with the distance impression OFS is nothing but a surrogate for GMO interests, and thinly veneered, at that.

That’s the WHO and the WHY of the $10K reward.

Frankly, given these facts, I’d rather someone  offer a $100K reward if they would all simply go away.

Flight 800: At Last! I’m no Longer a Conspiracy Theorist!


For nearly a decade I’ve been trying to get media and the public to examine some simple proofs of a conspiracy we call Flight 800 Friendly Fire; the downing of a jumbo jet killing 230 souls with a Navy missile fired in a war game exercise gone wrong. They only wanted to call me ‘just another conspiracy theorist.’

NOT ANY MORE.

Was flight 800 shot down by a navy missile?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

NTSB admits Flight 800 shot down

http://www.proparanoid.net/800i.htm

DISINFORMATION!

Seven years is a long time in Sheeple years (1 year in Sheeple years = 40 years of apathetic stupidity) and most Sheeple don’t even remember what Flight 800 was about, and some readers here may be younger and simply have no clue, or wish a refresher. In simple terms, Flight 800 was Trans World Airlines 747 jet bound out of New York late evening on July 17, 1996. Twelve minutes later, the plane and all 230 on board were lost in a fiery crash into the sea just off of Long Island. No one knew why, but rumors quickly sprang up that it was shot down by a Navy missile. Even military witnesses said so.

Even faster, the Wag-the-Dog disinformation engine of the U.S. Navy, Department of Defense, CIA, FBI, and the rest of the Federal Government launched one of the biggest criminal conspiracies of all time to cover up the truth. From the very beginning, I quickly involved myself as investigative writer because I quickly spotted traits of disinformation at play, and because I was compelled by a very credible claim that friendly fire was to blame by a revered source.

Non other than Pierre Salinger, former Press Secretary for Presidents John Kennedy and Lyndon Johnson, and former ABC Newsman, said that he was calling a press conference to reveal information from a CIA informant confirming the fact. But he had been set up for a fall with one of the oldest tricks in the disinformation handbook (as result, I wrote the 25 Rules of Disinformation to expose such tricks — my most famous and most read work with over 25,000,000 downloads); he was to become a strawman sacrifice to quash the rumor and associate it with ‘an untrustworthy Internet.’ Hence, the Salinger Syndrome. It destroyed him, but he is a hero for it.

I won’t explain the details of that, here (there is plenty of detail at my Flight 800 pages), nor much else about Flight 800 or the three-year running battle with Federal agents I and other civilian investigators had to endure to simply seek the truth and justice. I will only say that they used every dirty trick to shut us up they could muster, including sending out whole teams of FBI agents to intimidate us in person, Naval Intelligence people to pump us to see what we knew (pretending to be ordinary citizens), and I even got death threats from a foreign agent. Surveillance? You bet, including multiple vehicle tails, various aircraft, high-speed chases, and literally having to walk around Federal and local operatives to get from one side of a public venue to another. They wanted us to know they were dogging us.

But the one OTHER thing they did universally was to discount us by calling us ‘conspiracy theorists,’ and then ignoring anything we had to say. When the NTSB report finally came out, I personally had a field day combing over it and pointing out the obvious lies. They had falsified evidence, concealed evidence, and manufactured evidence to prove it was an electrical short which exploded a fuel tank. But that was also clearly impossible as even their own report showed. For each such point I’ve just mentioned, I was easily able to offer three different proofs. See my Three Simple Proofs (look for the small image of the gold NTSB CD a ways down the page).

But I was merely a ‘conspiracy theorist,’ and so, they still ignored me. Not one local news director would air my material, and the Oregonian flat refused my editorials. Of course, every major Network at the time was owned (controlling interest) by a major military contractor making Navy missile parts. Never mind that the proof was easy to illustrate. I was a conspiracy theorist, and THAT, was that. “Don’t confuse us with the facts, our minds are made up for us.”

Fast Forward a little.

The report finished, only one thing remained. The head of FBI, who personally monitored material I posted to my Web site (I cannot tell you how I know this without someone at FBI getting into a lot of trouble), and the head of the NTSB investigation, all resigned their posts at the end of the affair (publishing of the report), literally walking out on a scheduled meeting with a waiting collective of fellow civilian investigators, family members, and other ‘conspiracy theorists’ who were refusing to buy magic fuel tank explosion as ‘fact.’ They could not bear to look them in the face and lie to them in person, it seems.

With their resignations, NO ONE had ANYONE they could officially speak with, no one who would listen to, much less answer questions or challenges regarding the lies and blatant evidence of same. This was true in the halls of government, and in the newsrooms. We were all once more easily dismissed; conspiracy theorists are political and social zeroes in government and media circles. That’s why government loves to label dissenters. Pick a label, any label… in a political storm.

Fast Forward a LOT.

TODAY! On the radio today I heard that several NTSB Investigators have come forward and publicly admitted that the official report was doctored, stating flatly it was impossible that the fuel tank was responsible, and that there was indeed (as I had not only been saying, but showing) evidence of missile fire; it was a massive cover up.

What this means to YOU.

It means that conspiracy theorists (the good ones, like me – if you will permit me to so claim) are merely investigators forced to wear a label. It also means that many conspiracies are REAL, and self evident by the conflicting information in the official stories, and the cover up efforts and disinformation which follow. A cover up is itself proof of a conspiracy. You cannot have a cover up unless there is something to cover up, and its existence proves not only the crime is real, but it cannot even be undertaken except by a conspiracy of multiple parties to effect cover up; two interlocking conspiracies in one.

The lesson is: QUESTION GOVERNMENT, they lie. QUESTION THE OFFICIAL LINE, it has holes. QUESTION MEDIA, they are bought.

I urge you to read about Flight 800 at my Web site. There, you will learn things no other investigator has revealed. I was the only one to discover and illustrate the actual fraud in the NTSB Report. I was the first one to identify the ship most likely to have fired the missile (and subsequently visited by a foreign Agent making a death threat on behalf of their country — which should tell you something about the accuracy of my claims).

It will show you how easy it is to pull the wool over a Sheep’s eyes, and make us all into Sheep. It will show you how easy it is to fake it, and to make the public believe an unreal thing. It will reveal how easy it is to have a controlled media. It should leave you with a much greater respect for Truthers, and for conspiracy theorists, in general.

But why should I care, you might well ask? After all, I’m no longer a conspiracy theorist now that my theory has been proven FACT, and the conspiracy proven REAL, right?

WRONG. As long as Mr. Sorento and his crew run government, or others of like mind succeed him, there will be fresh lies to expose, new crimes to investigate. In fact, I’m working on a backlog, because that man and his cronies, like all Globalist Presidents, has more dark plots and evil deeds to dare than one conspiracy theorist, alone, can keep up with. Pray for me!

Care to help me out in other ways? All it takes is to pay attention, ask questions when facts conflict, and challenge government and media when they don’t get it right. And challenge the guy standing next to you when they don’t get it, because Sheeple are a terrible thing to leave running around loose in a Wolve’s playpen. If you ask me, that’s just plain good citizenship.

Or is that yet simply one more way of saying ‘terrorist’ in D.C.? Move along, Citizen, nothing to see here. Move along.

Sorento Secretly Installing Total Surveillance Society


15 Terrabytes of data on every Man, Woman, and Child in the U.S., tracking every trip, call, text, email you make, every URL you visit, every purchase or financial, social, and political action you take, all to profile you so they can predict you and blackmail, jail, or vanish you if it becomes convenient. Welcome to Herr Bush/Clinton/Sorento’s Total Surveillance Corporate Police State.

But wait… I have a simple $7 SOLUTION!

The NSA is secretly establishing the Total Information Awareness Office!

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

This particular post is intended to serve as recap and extended explanation of key concepts covered during a four-hour radio show interview with Clyde Lewis on Ground Zero, Friday, June 7th, 2013.

What you will learn reading this post…

• The nature of a Fascist Corporate Police State as defined largely by cooperative surveillance and spying upon ‘client’ citizens.
• That the National Security Agency (USARMY) is secretly implementing the Total Information Awareness Office under Sorento despite its being banned as unconstitutional by Congress, originally a Bush-Cheney plan;
• The Role of RFID (Radio Frequency Identification Devices) and PROMIS back-door spy software in TIAO;
• That traditional redress of grievances no longer remain a viable remedy TIAO;
• How you can spend just $7 to thwart the $2.7 billion dollar spying operation.

How can seven dollars stop government and corporations from spying on us?

How Fascism defines a Corporate Police State

NWOlogosIn America, there is something called a Social Contract between government and We, the People; the Constitution and Bill of Rights. That document makes We, the People, clients to a government body who we employ to serve our needs for societal functions; to govern and provide for the common good and protection. That is a sacred trust as well as a contractual obligation to government to so perform, and the contract additionally provides mechanisms for redress of grievances when government fails to fulfill its duties properly.

In America, We, the People also enter into financial contracts with all manner of big businesses; banks, phone companies, Internet providers, health care providers, insurance companies, and more. These contracts obligate these firms to provide select services with a certain fiduciary and legal responsibility to adhere to simple, basic guidelines of operational limits with respect to the privacy and security of our personal information entrusted to them.

These limits are essentially the same in scope and detail as those provided for in the Constitution and Bill of Rights, though perhaps spelled out in different terms. We are talking about the right to protect not just the privacy and security of our person, property, and information, but the rights of redress, freedom of speech, and so forth. No contract we have ever signed with any major firm has forfeited these rights or provided firms with any form of blank check to violate them. But that is what has happened…

Both government and most major corporations have grossly violated and betrayed every one of these rights.

How can you spot a corporate police state?

A clue:  when both government and big business act in collusion to violate those rights, and do so under Color of Law (twisting or claiming legal basis, illegally usurping the ‘power’ to violate our rights) — you have a Corporate Police State, a fascist regime.

What defines a corporate police state?

Another clue: When the intelligence community partners with or invests in Google and Facebook (and on and on) and uses their Web technology to spy on you (and in some cases to target you)… when the intelligence community accesses without warrant your email and your phone calls through partnerships with your Internet Service Provider and your telephone company… when banks report to the government your financial transactions and your medical and insurance records are available to Internal Revenue Service-enforced insurance companies… you are in a Corporate Police State, a fascist regime.

what is a corporate police state?

A final clue: when the government seeks to catalog every single activity, transaction, and event in the life of every man, woman, and child, regardless of if related to business, personal, public, or private affairs, and then employs sophisticated methods to psychologically profile and predict the individual, including sexual preferences and ‘practices,’ and saves all such information for use against them should they become ‘politically incorrect…’ you have what is called a total surveillance society, which also defines a Corporate Police State, a fascist regime. Below, we will see that is exactly what is about to take place in a matter of mere weeks.

Welcome to Sorento’s Corporate Police State.

What is a corporate police state?

Why we no longer have redress of grievances in America

In just a few short months of Sorento’s usurping the power of a pre Magna Carta King (claiming for himself the power to murder a citizen or vanish or torture them without due process or explanation under the NDAA), we have learned of an endless onslaught of exactly such proofs of the true nature of our government’s form as reviewed above. Almost daily, we learn our Constitution means nothing, and there is no redress seemingly possible, save perhaps that of armed revolt, always a serious question, but also much easier to effect than imagined. Governments literally make their own gallows.

Our Court System is too costly and slow to reign in Color of Law mechanisms (unconstitutional laws, executive orders, etc.) used to suppress rights; they can write new laws faster than we can challenge them, especially since the offending clauses are buried within innocent legislation. Because our Congress does not even read the Bills it signs, and is so full of subversive New World Order types (members of the Council on Foreign Relations, the Bilderbergers, Trilateral Commission, Skull and Bones, etc., all working to end national sovereignty in favor of a North American Union under one-World leader), we might as well give up on any help, there.

Our elections are a farce, there being no true difference in the hidden agenda of the power brokers of one party or the other, who collectively decide in back rooms who we get to choose from on our ballots in a two-party Dog and Pony Show. We are always offered candidates who are both marketable based on ‘publicly declared’ beliefs and agenda, but who in truth share a true common secret agenda and darker beliefs. We can prove this; the darker policies of Clinton were continued by Bush and then continued yet again by Obama, and yet once more this posting proves it when revealing the TIAO project being secreted within NSA.

Should poor Barry claim yet once more, ‘I didn’t know anything about (NSA=TIAO) until I turned on my TV…’ then he will have no choice but to arrest and try everyone in Command at NSA for treason. No. Instead Congress should be talking about arresting them AND Sorento, and Clinton, and, likely, Bush, Cheney, and Rumsfeld. But fat chance of any of the above, of course, as there IS NO REDRESS remaining in America. The fix is in.

Our media is bought and paid for, owned outright by essentially four corporations made up of more power Elite Boards of Directors and controlling shareholders from the New World Order crowd.  The Internet is slowly but surely being transformed into something ever more friendly to spying, censorship, and corporate/government’s total control. There is an Internet Kill switch in our near future, as well as a tax on every use. However, the Internet is where we will find the seven-dollar cure, thankfully, as disclosed at the end of this Post.

Sorento has ordered 30,000 drones to the skies to spy on us. He is spending up to 5 million per city to fund installation of surveillance cameras, some with microphones. As previously described, he has been working with the top Internet Service providers (e.g., Comcast, Century Link, et. Al) to insure every email and URL visit is accessible to government. He has done the same with every major cell phone carrier to allow access to our calls and text messages. But he was still not done, and now we learn of one final straw designed deliberately to break our backs…

What is Total Information Awareness?

Total Information Awareness is Reborn: Remember the TIAO?

Now we learn one more truth which reveals the full horror of our true predicament: Sorento, in continuation of plans started by Bush, and continued by Clinton, is having NSA (National Security Agency) quietly build a gargantuan secret new surveillance monitoring facility in Utah, and a somewhat smaller one to expand the existing facility at Ft. Mead, Maryland… in order to quietly and illegally implement the Total Information Awareness Office mandate already outlawed by Congressional decree as an unconstitutional, immoral, and intolerable invasion of privacy.

The TIAO was a military concept proposed under former Secretary of Defense (under Bush I) become Vice President (under Bush II), Dick Cheney, and former Secretary of Defense (under Ford and Bush II), Donald Rumsfeld, and former operator of CIA/DOD’s Operation Phoenix (mass assassination program of civilians during Vietnam War), and convicted felon (5 counts of obstruction of justice and lying to Congress about his illegal activities in Iran Contra), John Poindexter, Rear Admiral USN, Ret., and former head of a CIA front involved in health care database management systems.

TIAO was a Defense Advanced Research Project Agency (DARPA) plan to track every ‘transaction’ of every citizen, just as described in the teaser at page top. A transaction is defined, according to the original White Paper and Request for Proposals which I have personally reviewed, as going through doorways, passing before cameras, making a purchase or selling something or any other financial transaction, traveling, undertaking a communication by voice, fax, data, or any other information access or exchange, even to include mail and public libraries. In short, TOTAL INFORMATION AWARENESS.

It managed all this, in part, by backdoor access to corporate databases via directly partnering with businesses or by covert use of PROMIS spy software developed by CIA and embedded at every opportunity within popular commercial database as well as custom written database management software. Since all major corporate Intranets (private corporate Internet-like services) rely upon a telecommunications backplane (PBX phone systems), and because every major maker of PBX equipment includes (by buried legislation) a receptiveness to special signal codes which allow covert remote access by the military, triggering PROMIS infected database back doors is a simple matter.

Note: This fact was confirmed to me directly by a highly placed technical expert working for Lucient Technologies, a major supplier of PBX gear; his explanation as to how government was able to access and effect surveillance of any phone extension or computer within the corporate offices where I was working at the time. He revealed that clients were not to be informed that these backdoors exist.

What is RFID? What are Radio Frequency Identification Devices?

The Role of RFID

Two RFID tags of the smallest kind. paloaltofreepress.com (click)

The ‘secret weapon’ component of TIAO was to be RFID technology, those little Radio Frequency Identification Devices which are currently everywhere: they are in your money ($5 and up – though debunkers claim they are merely polyester strips designed to thwart counterfeiting… but polyester does not explode in a microwave, though it will melt), in most newer credit cards, many drivers licenses, all Passports, shipping labels (and soon, postage stamps), transportation tickets, and almost any product you buy (soon, all products). If you have bought Gillette razor blades, Max Factor make up, Pampers, and any of thousands of other popular items from ink pens to computers from any major retailer, you have RFID all over your home and, likely, on your person.

Cash registers, bank tellers, secure access doorways, turnstiles, security cameras, and just plane hidden sensors anywhere can be modified to scan and learn the unique serial number of an RFID tag (which it reports upon radio command at distances of several hundred feet, and even through walls when special equipment is employed for the purpose). Once a tag is identified with an individual in a database, everything they do while possessing it can be tracked and cataloged. RFID devices are often large (I’ve seen as large as two-inches square in mailing labels) and easy to spot, but they can also be as small as the period at the end of this sentence .

Note: The tracking bioimplant, Digital Angel (aka Mark of the Beast) manufactured and sold by CIA fronts, is nothing more than an RFID tag with Web/Cell phone GPS technology added, a feature common to many RFID chips installed in cell phones (common to most new phones), watches, ink pens, ankle and wrist bracelets, and other devices intended to be tracked. The original part number of the first known RFID application to ‘track inventory’ was a Boeing Aircraft component with the number 666.

In fact, there is an insidious form of it known as Smart Dust, so small they can float in the air, and even be directed up or down on currents of air as if operated by a glider pilot. These (motes) are sometimes placed on persons of interest (one way: ‘air puffer machines’ at Airport security can ‘sniff’ for explosives, or plant smart dust in your hair and clothes). These migrate from person to person in general contact with one another, and permeate anything they might handle and any place they might sit.

Smart dust can do more than track, with select motes capable of sensing (some dedicated thing) and communicating one with another to act with a hive intelligence. This allows them to report information as if a more traditional complex surveillance system, triggered remotely by laser beams perhaps a mile or more distant.

The US Army can and can track RFID at select points along American highways, railways, and some waterways (esp., ferrys, bridges). This is a key tactical component of the Canamex Corridor which will serve as precursor to and lever for the North American Union. Combined with the other ‘transactions’ earlier cited, as well as feeds from security cameras and drones using advanced facial recognition, license plate readers, and other biometric and tracking methods, not to mention the full array of telecommunications signal capture, NSA can process bulk data without human interaction for analysis,  reporting, cataloging and storage, or undertake requested analytical tasks against specific targets, or sift through information to locate or focus on select targets by human analyists.

If you suddenly are deemed politically incorrect sufficient by almost any given person in the chain of command at NSA, the military, FEMA, DHS, FBI, CIA, the White House, or almost any other government power center, you could be quickly psychologically profiled to see what kind of targeting would best reduce you to a social, financial, and political zero, or to predict your every move in case it was felt you needed a visit by Men in Black for ‘special handling.’ That could mean anything from scare tactics to arrest and detention, to torture and vanishing by murder.

That was the TIA as originally envisioned, and it was so horrifying to anyone with an inkling of understanding of words like Constitution, Rights, Freedom, and America, that even our Globalist bought Congress said “NO!” But Bush, Clinton, and now Sorento have blessed covert continuance of the military plan. The new NSA facilities will become at some level, the de facto TIAO without so declaring, according to NSA expert, James Bamford.

This whole affair is especially significant in one way which is quite calculated and extremely dangerous to your family’s future…

What is less obvious but truly significant is that TIAO establishes the only difference between all failed despot-driven tyrannical rule-the-World attempts through history and what is taking place right here, right now in America. Specifically, the technological advances you have just read about might actually let them pull it off. All prior efforts failed because once the people understand their prediciment, they can elect to revolt, and it then becomes a wild-card battle with no way to guarantee victory to the despot. Too many people doing Lord knows what quietly and acting out suddenly without warning.

Once NSA goes online with TIAO, however, within a matter of Months (by this September at soonest), no activist, no gun owner, no politician, no law enforcement official, no judge, no news reporter, no person of wealth, no citizen, and yes, no criminal or terrorist, will be able to make a move without it being documented, analyzed — duly considered and potentially countered with quiet surgical attacks before the move can even be completed.

Yet — will they use this powerful tool to prevent terrorism or criminal acts, the sole basis for justifying the tool in the first place?

NOT ON YOUR LIFE. They will be used ONLY to maintain and tighten political control (why it’s called Political Control Technology of the Military-Police-Politico Force Matrix — as defined by the Revolution in Military Affairs).  They dare not use it for something as unimportant to ‘National Security’ (their definition being security of the people in power) as might be seen in a terror plot on a school or a city, unless it happened to include an attack on the President or someone key to the Power Elite.

To risk doing so would risk revealing the true power and capability of the TIAO tools, and thereby, risk full-scale revolt by those in the Military and Law Enforcement who still understand and obey their Oaths of Office. Besides, every terror or criminal act carried out empowers them to effect more political control; government benefits thereby.

I’ve already personally done more to fight terror attacks in America as a citizen than they ever will be able to claim by using any weapon of Political Control — though Bush took credit for my efforts as if his Administration’s own.

Therefore, NSA, via TIAO, will be able to pick us off one by one as we wake up and start to exhibit politically incorrect thoughts or take actions which do not serve or go along with the interests of those in control; the corporate friendly thugs running a fascist police state for the Globalist agenda.

First they will go for Anon and Anarchists, and you won’t say anything because you are not Anon or an Anarchist. They will next go for Truthers and 99% crowd, and you won’t say anything because you are not one of them, either. Then they will go for the rest of the Activists and Conspiracy Theorists, and you still won’t say anything. Then they will start to go for the investigative writers and newsmen, and lawmen, and politicians who do start to question, and you still won’t say anything, because if they can take them out, what could YOU possibly do.

Finally, when they come for you, no one will be left to say anything on your behalf.

What can we do to stop wholesale spying on citizens?

A simple $7 cure

Only you can prevent Fascism (click)

There are many things you can do. Make clear to your Congressman that you will not tolerate a secret TIAO and demand the NSA be reigned in, and (almost literally) NUKE the project in Utah and Ft. Mead; level it to the ground. Demand reversal of all post 9-11 legislation that deals with ‘terrorism’ by taking away our rights to privacy. Demand the 30,000 drones never reach American skies. Demand an investigation as to who really runs this country with the aim to kick Globalists out of government posts, starting with criminals in the White House and Congress. We need a political purge.

Become politically incorrect, question government, protest as a 99 percenter, Truther, or activist of some useful sort; be a functioning participating citizen! Make yourself heard above the rhetoric of a controlled media.

And one more thing, as I promised…

Spend $7 (or more if you wish) to join NNN OSP, the Nodular Netizen Network Open Source Project to create a 100% citizen-owned-and-operated wireless Internet alternative. Why? Because ONLY citizens make it up, there is no corporate ISP needed and thus no monthly fee. There is no government control or censorship, no government or corporate spying even possible; YOU are the Web!

If just five people join in each neighborhood, it is sufficient to assure its existence and success, creating a communications channel which is beyond NSA’s ability to access. In fact, the ONLY way government can access NNN communications is to go directly to the sender or reciever; the data does not reside anywhere else along the chain, and never passes through a government friendly corporate portal. And, once NNN OSP becomes popular enough, it will also support VOIP with Smart Phones and take away TIAO’s access to voice conversations, as well.

Visit nnnosp.org to learn more.

There are many, many features and benefits not even possible on the WWW. There are even ways the NNN can make you money. Become the Web, TODAY… right this very MINUTE!

Once we have millions of members, the message may just get through… errant governments are superfluous to the Will of the People when they can freely discuss in private what they think about their government (or anything else). They will at last fear us as they should… as our Founding Father’s said it should be. Then, and only then, will they do our bidding, instead of the bidding of the Globalist corporate powers.

Can you afford NOT to spend $7 to thwart the New World Order?

 

FREE WILL: A TIs Greatest Asset, Oft Hardest to Employ


What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.

Free will: a Tis greatest asset, oft hardest to employ

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can you do if you are a targeted individual?

What you will learn reading this in-depth post…

  • That belief structures define us, establish our psychology, and our responses to stimuli;
  • There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
  • Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
  • The pitfalls of targeting psychology as it relates to Free Will, and;
  • How to use Free Will to thwart targeting and run psyops on the perps.

Where do you get help if you are a targeted individual?

Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let’s take an in-depth and lengthy examination, and see…

 

Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.

 

Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.

 

We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.

 

When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.

 

Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.

 

Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon.  For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.

 

This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted.  Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows.  But that does not mean the information has no power over perps, if realized and properly used.

 

Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.

 

The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.

 

 Why won’t people believe it when someone says they are being targeted?

It gets tricky

Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key ‘theme’ for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.

 

 

Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.

 

Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.

 

Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.

 

Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.

 

This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’

 

Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.

 

Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.

 

At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of ‘sensing’ symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.

 

Once that transpires, or where implants really are in use, it is almost impossible to work one’s way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.

 Who is responsible for political control technology?

Consequences of false beliefs:

To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.

 

This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.

 

But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.

 

This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).

 

The logical path][ Were I able to go into a TI’s home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.

 

I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.

 

Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.

 

Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).

 

And understand, I’m not saying I’m always right, by any means. I’m frequently wrong; since I am not there, I must rely on the information I’m given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.

 

Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) ‘hook up’ with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.

 

Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.

 

The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.

 

Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.

 

This is why I no longer participate in group dialogs, polls, petitions, etc.

 

And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.

 

How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.

 

I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned… but with luck, at some point, there is an opportunity to suddenly break away altogether.

 

But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that’s when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.

What is political control technology?

But then there is FREE WILL

Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.

 

A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.

 

Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.

 

To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.

 

They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.

 

 

 

 

I’ve Defrauded and Deluded Myself, I Am Not Me, But I AM


We go through life thinking we know who we are and why we do what we do, but like Actors who start believing they are the sum of their Press Clippings and the heroic characters they play, we are frauds. It took a simple but powerful video to teach me the truth, something I once knew, but lost sight of.

I once was lost, but now am found.

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What you will learn reading this post…

  • I’m a fool, and have been offering knowledge as if expert and wise, when in fact, I fall short;
  • While my advice and opinions are based on truth and logic, I should have offered a better, more useful message;
  • That message does not betray my beliefs and life experiences, but instead, explains them, and gives them meaning;
  • That it should be the same for you as it was for me, if you will but open your heart and consider it;

Whre can I get help when no one believes my story?

A note of apology: a technical glitch with wordpress refuses to let me format the document correctly, making it a little difficult to separate paragraphs. No matter what I do, it displays as intended in preview mode, but not in actual URL access. I regret any inconvenience.

Introspection: the most valuable tool an investigative author could possibly have (examine yourself, first). From heartofaleaer blog (click)

I’m talking about me, H. Michael Sweeney, aka the Professional Paranoid, activist author, and consultant on privacy/security, and abuse of power topics. People come to me for help all the time, and I’ve started to believe in the value of my advice as much as they hope it to be of value in their desperation. Well, my advice may be good some of the time (more often than not, I have always thought, based on feedback), but even so, I’ve not quite been offering the best advice, in the best possible way.

This self examination also translates to my abuse of power issues of which I so frequently write, as everything I tend to blog about is so much in parallel to the basic aspects of things now clearly revealed to me because of simple but powerful video, that I’m hoping those who read my blog posts as activists, will see that parallel as well. It’s not just about me, its about everything in the World and how we deal with it. Let me explain by first going back in time. Some of you who have read my material before may know some of this, but as Paul Harvey used to say, its time “For the rest of the story…”

I doubt you’ve ever had to go up against dirty cops, bounty hunters, and CIA/FBI types, some of whom wanted to kill you (e.g., gun in folded newspaper, sniper’s nest carved out of branches high in a hillside tree outside your bedroom window through which came a targeting laser at night, being chased by up to eight cars in a high speed chases). This is the kind of high adventure we all enjoy seeing in action movies and television, but its an entirely different perspective when you are the hopeful hero, and your opponents are not acting under legal authority, and there is no acting, but actual intent to harm.
I’m rather certain that you, as lone individual, could not well square off against an enemy that has dozens of players to help them, such that their war against you as their target unfolds 24/7, but you are only able to devote but a few hours of tactics each day. More so the problem when they have an unlimited budget and the best technical toys money can buy — and you have only what you own around the home, and a modest income and savings, which they also target and erode.
I doubt you have ever had to come home to find men with walkie-talkies fleeing your house, or find it had been broken into and every computer and every disk in the house upon which could be stored data, even those secreted away in storage areas, had been stolen — or discover that the neighbor across the street, a Forward Marine Observer retired for wounds acquired in service in Iraq, upon returning home across the street with his Mother… was, as casually and (unwisely) revealed in bragging by his Mother, approached by CIA Agents who asked him to work for them… and later, learning from a professional investigator retired from the State Police in another state that Infrared Night Goggle vision surveillance of your home was being conducted from that neighbor’s home, and further confirmed that all phones in your home and select other devices were ‘bugged’.
I doubt you’ve had your mail regularly pilfered, learning time and again that people trying to reach your home-based business had sent you mail you never received, some of it being orders for product, and like interference of inbound telephone calls where your phone is never answered, when at your end, it never rang at all, or that harassment telephone calls to family at all hours, and other calls known to be from your opponents — magically did not appear on telephone company call records. I doubt you’ve ever had the Consulate in another country literally beg you to provide them with copies of your business Newsletter to distribute to potential clients, only to then have the U.S. State Department suddenly, out of the blue, declare your Newsletter ‘Illegal’ under the laws in that country, but refusing to cite the law, or answer further questions.
I doubt you’ve had to suffer nightly assaults on your home, attempted break ins within moments of retiring for the night… night after night. Or, upon calling the Police, have them ignore evidence offered of the break in, ignore the fact that your spouse agreed with your descriptions of events, and instead elected in their Police Report to say only things which made the whole affair seem imagined, implying you a Paranoidal Schizophrenic, even suggesting County Mental Health should be contacted.
Imagine how you would feel, realizing it odd that this Officer responded within mere seconds of dialing 9-11, and later, would try to kill you. Such events, for me, were one reason I based the title theme of my first book upon the topic of Paranoia; for I quickly learned that someone who reports such things is quickly labeled paranoid, because no one wants to believe in the Boogyman, least of all people who are part of the System from within which he seems to come.
Ergo, there was no one to turn to for help. No authorities would listen. Even friends and relatives find such stories hard to believe, and tend turn away with denial of any truly useful help. And yet help came.
And even when it was clearly the help of other Men, it was also clear their help originated from God, typically quite unexpected and coincidental, or a highly unlikely source, such as a total stranger offering $250 and saying, “Something tells me you need this more than I do,” at a time when I was trying to find a way to afford a high quality audio tape recording system as defensive tool. And when things seemed bleakest, an old competitor in a prior business called me up  after ten years of no contact, and offered me a significant position in a new business enterprise, one which would lead to more such helps in time, and become a safe haven of sorts.
I lived such a life for nearly five years, and in almost EVERY battle, enjoyed victory, or was at least protected from more serious losses than intended. The James Bondian nightmare was at long last ended by literally discovering the truth about why I was targeted. I had, it seems, accidentally learned of illegal crimes which they feared I might expose. They wanted to know what I really knew, who else knew, and who was ‘helping me’ to best them, that they might destroy us all and be safe. But there were none others, not any they could find or believe existent.
They could not believe me acting alone, because time and again I detected those who covertly worked against me and exposed them such that they were embarrassed to their superiors, and set aside for someone I could not recognize on sight, next time. I eventually identified every player, where they lived and worked, and discovered the truth of their varied criminal enterprises, and those dark things they were hoping to protect by targeting me. In short, they themsleves led me to understand the very thing they feared: knowledge of their sins.
Phone numbers, license plates, public and, in some cases, private records, etc., were gained on key persons and firms not just locally, but nationally, all the way to Washington, D.C. and beyond. I even had covert White House, NSA, World Bank, and like phone numbers before it was said and done, and access to logbooks within Federal offices and even entire roll-a-dex and index card systems from the desk of one of my main opponent’s managers. And I never had to violate a law to do it. God was my key to their secretive locks.
I even managed frequent access to their innermost places without detection. I laugh, recalling walking into one of their covert offices, and the man seated there, a recognized opponent, falling out of his chair to the floor in surprise! In another example, a truly high-security area was discovered in a way that caused three people encountered there to scurry from my eyesight like cockroaches, placing folders to their faces, doing about faces, closing doors, and so forth. Evil cannot hide its face quickly enough, it seems.
I think their disbelief was largely because they also did not believe in God. Why I so believe is the where we are headed in the telling.
In the end, I won the war, thought the net cost to me was personally quite high. Forced into bankruptcy, forced to sell our wonderful hillside dream home, loss of the very computers used in my work and an insurance claim thwarted by enemy tactics so they could not be replaced, a foster daughter who asked to be taken out of our home because she did not feel safe, and in time, severe blows to the bonds between other family members. I rank my financial loss at about a quarter million, but it appears they spent that much to destroy me in a single month. Their money bought them little, diluted by God, as were their endless man-hours of effort against me.
It’s absolutely true. In the end, I indeed did win, but not of my own cleverness or determination. I had reluctantly entered into that battle with no special skills or training of their caliber, and throughout the battle had no weapons as they might count weapons. Yet from the very first day of their presence in my life, almost every skirmish of true importance would be mine. It was, at times, turning out to be such a comedy of errors to my favor, that it literally became fun to do battle.
All this I did, and yet, not I. There was indeed another.
You see, my chief weapons were mere words, and a belief in Good over Evil. The words were the Word of God, and were the heart and meat of Good, as well as other core beliefs, and an abiding Faith. I was only a few years earlier caught up in a cult, and knew not what I believed, and understood not the truth of God and Man, and Satan’s role in my life. And yet I was saved, and I grew daily in the Word such that the Truth was at last mine, and I was set FREE! So free, in fact, that NO MAN, no matter their abilities and resources, could truly harm me without God’s permission. That belief was my armor against all-powerful opponents and impossible odds of survival.
It was proven almost daily each and every year of battle. Also provided for during the darkest of financial threats fostered by my enemy, was our daily bread. A source of income sufficient, sometimes even exactly equal to the cost of minimal foodstuffs required for the day — would become available that day, or the day before — or at other times, it might be on a weekly or other basis. Other magical moments also addressed such needs in ways not involving money, at all. We lived by Matthew 6:25-27, alone for long periods of time.
That’s all behind me now by more than a decade, and though I have written seven books which generally assault the face of my old enemy and his newer counterparts, those responsible for dark bumps in the night of recent American history, my opponents largely leave me alone, now. The worst I’ve gotten is hate mail from a sitting President for exposing ties to CIA for both him and his wife. I’m still protected by what I learned, and they fear me, or more correctly, what I know and might reveal if harmed.
What a shame that any citizen of any land should need to blackmail their way to safety. But I traded one dark set of secrets which I keep safe, to keep me and family safe, and to allow me to now speak openly of other things without reprisal. It became the basis of a new livelihood as activist author, lecturer, and consultant on privacy and security, and abuse of power. It redefined me and gave me new purpose, to help others who have been called ‘paranoid,’ but who are not, people who can get help no where else.
What can we learn by humbling ourselves?

The Revelation

And so, in sensing a kind of invulnerability, I find myself becoming, like many Hollywood actors, a little bit too self assured. Like them, I now realize, I’ve started to believe my own public image; a false perception. I am not the hero of my life people presume by the outcome of exploits, and certainly not the Knight who comes to save them from Men in Black or other dark threats.
I am nothing without God, can do nothing without Him. Oh, sure, I give little credits to Faith and quotes of scripture when I hand out advice and recount my victories, but in my innermost view of self, I’ve wandered from full reliance upon the true power of the Word, and become conceited as if I really were a mighty warrior, wisened and ever alert, that person my enemies imagined me to be.
I had fallen back asleep, succumbed by the misty aura of public attention and pleas for help, a kind of sad fan mail. I have become pretender, forgetful of things learned of great value.
Today, however, one of the ‘sheep’ who comes to me seeking help reminded me of one of my own slogans, something I used to employ when I was an instructor. I used to say, that one reason I liked to teach was, that no matter how much one knew as a teacher, and how little a student might know, if the teacher did their job right, both would learn something from one another. This young woman, now experiencing targeting somewhat like my own, in seeking me out from afar to ask advice, helped knock me off my pedestal of self promotion, and bring me back to Earth in a grounded way. She reawakened me, and taught me that which I had forgotten.
She sent me a simple but very powerful video, thinking I would like it because, as I tell all my clients, you must “Put on the Armor of God,” to be victorious against evil; Ephesians 6:10-18.
Well, I must tell you I was completely unprepared, and the video was indeed irresistible, and it was VERY powerful. Though I was pressed for time, I took the time, and watched it not once, but three times. Every time I got to the part which actually involved Putting on the Armor of God, I broke into tears. Even so now just writing of it, this very moment, my eyes water in remembrance.
You see, in the video, the truth was graphically shown. It was not ME… IT NEVER WAS. It could not possibly be me, nor even YOU, no matter your true strength or resources… IT CAN NEVER BE.
WE do not put on the Armor of God, or do any of the things we think we do in Christ’s name. Nor, for the matter, can we do anything to be saved in the first place. It is HE who does the work. He calls us to salvation. He works in our hearts to draw us unto him, and redemption. He then arms us with what we need to do battle. The only thing he asks us to do, is to be willing to do battle, a willingness born of belief in Him and his Word, and out of love for Him and his Word.
He asks only that we allow him to enter into us to be our inner strength of body and mind, and to cloth us with his white raiments that we are Justifed and pure, enfolded in his Grace, the impenetrable and almighty Armor of God. His Holy Spirit fills us, and thus filled, our sinful nature yields, and is fled.
But as I have learned from my young friend and her thoughtfully provided video. We slip. We forget. We build up the sinful Man yet again, and again, bits at a time, and even in leaps and bounds. But the beauty of God’s Armor is that it is not tarnished, but renewed and polished. All it takes for this renewal is to once more acknowledge the Word, and truly contemplate it, embrace it, believe it, and most of all, LIVE IT, once more.
Forgive the length of this missive. A writer cannot stop typing so easily as to simply say, ‘Please watch this video.’ I’m going to watch it every morning for a week, and I’m betting I will have one of the best weeks of my life doing so. Join me, please, and remember from whence life and Free Will comes. Why would we ever choose to live a life without acknowledging and honoring the source of it?
Know also, if you click the Youtube user’s link you will find more videos of such quality and Meat as this, from someone previously unknown to me, the Ellerslie Mission Society  who has a Website where the same videos, and more such bounty is found.
Pleas consider to share, reblog, etc. It is more important and valuable than any other helps or advice I’ve ever given elsewhere in my books, Web offerings, radio interviews, and consultancy, etc.
For I am not that I think I am; I become what truly I AM when the Holy Spirit works through me.
I AM, for those who don’t quite get my drift, is the actual name of God given to Moses. You can do nothing except by IAM, because every small thing you do is, in your mind, preceded with the thought… “I am going to change the channel… get a drink of water… go to bed, etc.”  Acts born of evil temptation, on the other hand, start with conclusive edicts “Grab it while no one is looking… kill him… make up a lie, etc.”
But these are mere suggestions introduced by Satan, and have no power at all except by the individual’s own Free Will, which is also God’s gift to use. That’s what it means when you forecast an act; “I will call you tomorrow,” is you stating you Will it should be so, doing so FREELY. Why would we ever choose to use it for anything but right-use-ness?
I will be better in serving you in future blogs, more mindful of who I AM, really. Our battles with the New World Order as a group, We the People, and micro battles between targeted individuals with Men in Black… these are no different than Christ vs. Satan on the Day of Armedgeddon, or lesser battles, such as a small boy tempted to steal a piece of candy. In all such cases, if those on the side of Good fight wearing the Armor of God, they will prevail. We do ourselves and our cause disservice when we forget that point and fight purely with our own strength in bitterness.
Forgive my bitterness. It was born of forgetfulness.

Monsanto Protection Act Lights Fuse of Armed Insurrection


Self Defense is the right of all Men regardless of any Law. When an illegal law deems to both make redress and self defense illegal, many will see it as time for a revolution. The Monsanto are coming. To Arms! To Arms!
 
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Will Monsanto GMO spark a revolution?

Reading this post and its links, you will learn…

 
• Things so terrible that I will not bullet list them, lest you flee this page in fear of dark things;
• Things which may mean life or death to you, your family, and America as you know it;
• Things which, in the best of outcomes will undoubtedly mean thousands of lives taken by violence and/or a biowar intending depopulation.
Why does Monsanto have its own Police Force?

They keep perfecting mass murder. (click) From an interesting beforeitsnews.com piece

Many of us ‘prepers’ and ‘conspiracy buffs’  have warned for some time that government wants a showdown with YOU in their gunsights. Now we start to see proof there is a price to be paid for failing to heed, for those not prepared to face what apathy and inaction leads us all toward at speed. Got Bushmaster? No? Gave it up to Feinstan, Bloomberg, Sorento, et. al? Better put your affairs in order, then.

This latest tyrannical atrocity, The Farmer Assurance Provision Act of 2013, also dubbed the Monsanto Protection Act to reflect fascist provisions burried deep within it, is one line in the sand many will not likely let be crossed without a gunfight, or similar violence. Understand this: a fuse has been lit, and while the length of its burn is not known, the bang at the end could very well turn into a repeat of 1776.

Frankly, I don’t know whether to pray it does, or does not; it’s THAT SERIOUS a line in the sand, to me.

But it is not my opinion which matters as much as does YOURS. But do you even have one? If you do not, or don’t even know of and understand the nature of the threat from GMO corn, soy, and other bioengineered seed programs, and matters closely related, you will be happy to know Mother nature has a special place for you. It is called survival of the fittest, and destruction of the weakest, you being the latter in the equation; those who die from eating genocidal foods, a very real possibility in almost any proper review of facts.

We are talking about crops genetically modified to have built-in pesticide powers based on Monsanto’s Roundup, a known poisonous substance, and other ‘properties’ which make it even more dangerous. The Act gives Monsanto the power of life and death decisions with zero responsibility (impunity), and takes away the ONE THING which is designed by our Forefathers to PREVENT armed revolution; the means of the People to seek redress of grievances with government through the courts.

OK, then, if that’s how they want it… get ready to ‘pass the ammunition,’ instead.

Because why? Because there is so much resistance to labeling such foods at every turn, and because they are used to feed animals you eat in other foods, there is no way currently to avoid eating them, or know if you are or are not, save perhaps eating only organic produce. Even then, contamination is not impossible. The only solution left would be to stop Monsanto and friends DEAD in their tracks, and unfortunately, it appears they wish for force matters such that the only option available for us to do so may be to seek it in literal terms.

We would rather it be figurative. But if YOU otherwise make no collective effort to stop them peacefully, you will deserve your fate for being a dumbed-downed mind-controlled Sheeple. Your apathy and non participation will be causal to any escalation toward violence forced on those unable to make headway peacefully. Their failure will be because of your lack of support.

If you don’t get that, stop reading this until you’ve visited Oz to find some brain matter to replace the straw in your head. It’s all over the Internet, and from many, many viable sources (even the disinformation deliberately put out as a straw man tactic is based on ‘kernels’ of fearsome truth — and efforts to debunk this particular ‘conspiracy theory’ themselves lack credibility and tend to follow the 25 Rules of Disinformation, such as employing straw men, vanishing evidence, and so forth).

Is self defense justified if GMO threatens the lives of you and your family?

Things to know for your survival:

GMO is tied to the Doomsday Vault, Agenda 21, Codex Alimentarius, depopulation

Doomsday Vault, Agenda 21, Codex Alimentarius, = depopulation

If the above still does not convince you, ask yourself why GMO crop makers, Bill Gates, and Rockefeller have funded, along with Bilderberger leaders, a ‘Doomsday Seed Vault’ protected by the highest of security on a private Island in frozen wastelands owned by a Bilderberger. There, non GMO seeds are being stored for some future use, accessible ONLY by the Globalist Elite — while at the same time we see from the above that these same people are taking steps to insure non GMO seed cannot even be purchased, much less used, without violating law. We are talking about billionaires who have private chefs, often having them travel with them on trips, and NEVER eat anything we eat, except on a rare lark.

Part of that story requires us to add to this complex mix of topics some equally scary things outside of, but tangent to GMO: Agenda 21 and Codex Alimentarius, for instance, and the concept of depopulation, long a known goal of Globalists to reduce us to a half million souls. Consider all these things collectively, and you realize that violence may be the only recourse, sooner or later, unless we can unify and find a quick way to avoid it. But the fuse, having been lit, makes sooner more urgent, and later less tenable.

Now, Sorento and Congress show their true colors as traitors to all Americans and the American way of life… even life itself, in fact, the hallmark of Satanic thinking in the Illuminati Plan to create a one-World government that they might seat the Antichrist. It’s O.K. if you don’t want to subscribe to that ‘theory,’ but I’ve written books with over 1,500 footnotes to make that very case.

But it is just a Congressional Bill we are talking about, and, after all, Congressmen will simply excuse themselves, saying they ‘didn’t read the Bill’ before they voted it. Sorry, but if things erupt with violence (and to a lesser degree if it does not), they will still be held accountable if they voted for it, as will the Great Pretender who signed it. Consider the full measure of risk they undertake by their crime against humanity, which is also treasonous. There can be no greater penalty than those common in such crimes, especially if during a war (revolution).

And for the matter, therein (Sorento’s signature) lies the problem for Monsanto. Even if Monsanto is not razed to the ground by angry citizens… even if their poisonous ‘product,’  which is nothing more than a tool designed to give them a global monopoly on farming and to depopulate the World with a soft kill is not destroyed in grain stores and warehouses before it is planted… even if they survive attacks against them and their evil seed… the Act does not afford the protection they presume by its signing into ‘law’. It is a fictional belief… not Law at all, but a fictional ‘law’ which is at best temporarily useful while government pretends it legitimate.

Any Bill signed by Mr. Sorento under a false identity will eventually be ruled null and void as will be all ‘law’ of the last four plus years of his charade; his pretense cannot long last, even if it requires a number of years after his final term in office expires to force the Courts to admit it. He has no power, and neither does anything he signs. There has been zero Law enacted since he took Office. He, and all who helped in the charade will be jailed or worse, and of no power whatsoever to help Monsanto (Oh, happy day!)

There will be no protections if the ‘law’ thought affording them was found illegal. Nor if collusion between Monsanto and politicians writing the Bill, and the White House are established as criminal in nature (as is already seeming to be the case in the links above). Even if the Courts were so foolish as to overlook such reasons for nullification, perhaps due to bribes or threats, or the influence of Clarence Thomas, the court of Public Opinion and a little thing called self defense will still afford a final ruling which will be enforced.

Can self defense ever be peaceful?

PEOPLE HAVE THE RIGHT TO DEFEND THEMSELVES FROM HARM

This ACT, I fear, is the final spark which has at last lit a fuse which cannot easily be put out; a fuse leading to armed insurrection. I’ve tried to warn government and citizens in my earlier posts that every time politicians elect a criminal or unconstitutional choice, they put a gun to their own heads in a game of Russian Roulette, a game which decides if armed revolt breaks out.

Given the levels of frustration that I feel in this matter, I can only imagine how famers feel, and picture them raiding grain stores and destroying Monsanto product wholesale, if not marching on Monsanto properties with guns and torches to level them and drag corporate bosses into the streets. I fear hanging in effigy may not be seen sufficient. Hopefully I am wrong, and mere alarmist. But if I thought it would actually end the matter usefully, I’d be tempted myself. But would it be useful, really?

I wonder. I wonder because I also fear this is exactly the situation intended by Globalist leaders who seem to control our government. I fear it why DHS has placed bid requests for 1.4 billion rounds of munitions, including 9 million sniper rounds, none of it for normal military operations. In fact, I fear it related to a long list of other curious purchases and moves by government over the last few years, especially those since Sorento took office.

They collectively point to an intent to light such a fuse, I fear. Such pointers include, for instance, a steady stream of military mock raids on American cities with armed helicopters discharging gattling guns, soldiers repelling from or landed from the choppers to blow the doors off of buildings and engage in combat with ‘resistance,’ of some imagined sort.

Who will stop GMO crops from killing you or your family?

WE ARE THAT RESISTANCE

Confrontation is exactly what I and many others have feared all along was intended at some point in the future, and now, with the Act — it seems absolutely unavoidable and on the near horizon. Now that they see they cannot arrange to ban guns which approximate military grade, thereby effecting a de facto gun seizure, indications are now that they are going to instead foment a wave of violence in the heartlands and cities to justify labeling gun owners as a threat to national security, and come after them by force.

I even worry they may even foment that violence themselves and blame it on us (false flag operations) to justify their heavy hand to passive onlookers, the Sheeple at large. For this Act will undoubtedly result in such outrage and frustration as to move those most concerned to violence, even if it takes some entrapment or priming of the pump of anger and concern. If not shooting, then arson or bombing, from which must eventually evolve shooting by on side or the other. The fuse has been lit.

While there are only a few million rural persons who’s livelihoods still depend on farming success, almost all are quite well armed. There are tens of millions more who truly understand GMA enough to side with Farmers, a large number of them also armed, and some number of them are surely angry enough to say, “Pass the ammunition!”

But even if only 1% of farmers dared take a militant stand and resist with forceful action to protect their way of life, and the lives of all us… to save us from domination and ruination by Monsanto and a truly insane and clearly fascist government (defined, in part, as a government which makes oppressive laws to the benefit of corporate profits and the power elite to the detriment of the citizens)… even 1/tenth that number is  more than enough people to start a full-scale armed revolution (statistically proven through history).

The mechanics of revolution, as I have pointed out in above linked post, clearly require only two things: a handful of angry people willing to do something which cannot be ignored by government, something which is seen to strike a blow for freedom; and a government willing to use a heavy hand to quash them for their trouble. In every instance, instead of quashing them, they make martyrs and fuel the anger in those previously asleep in their inaction. As result, those who survived the start of matters are joined by many millions more, and a full-scale revolution is born. “Pass the ammunition!”

This time, I fear government has indeed gone to far, and I urge everyone who is angered and moved to action to please stop, think, and act responsibly. Do not react carelessly out of emotion. Violence on your part is likely expected, and desired. Do not give in. Instead, organize and resist in every legal way you can muster (there are ways to do that). As part of the protest, I beg you make clear, as this post attempts to warn, that escalation will be the consequence of inaction by government and the criminal corporations.

They must be shown we will not let them continue to consider humans as mere objects they may move about on a financial and political chessboards, and knock off the board as pawns to suffer death or a life of misery or servitude. We will not idly stand by and let them win the game in which only they, Globalists all, deem to be onlyplayers with any chance at winning. We pawns must become our own self-guided army, and change the rule of the game so that we… we mere avatars of their avarice, are the ones who win.

How can GMO crops be stopped?

WE DARE NOT LET THE GAME CONTINUE AS IS

The fuse is lit. Who will help extinguish it by right action? Who will fan it to burn faster? Only YOU can decide. YOU are what you’ve been waiting for. Either way, I’m looking forward to ruining their game. But I can do nothing without YOU, be it words or bullets that eventually do the talking.

Enough talking. It’s all made me hungry. Let’s get something to eat…

On second thought, I’m not so sure there’s anything good to eat any more. Perhaps I’ll just share this post with some friends, instead, and start a dialog about what we might be able to do change that little problem.

What can we do to stop Monsanto madness?\\\\\\\\\\\

Related articles

Fiction of Future Fact? 23 Families Jailed, Loose Their Homes in Weekend Raid


Is it mere fiction (from book, Fatal Rebirth), or your future reality? Don’t be so sure you know the answer, because smaller scale events like it have already happened.

What will happen if martial law is declared?

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
 

Actual MJTF suburban raid. The crime? Selling unpasturized milk through a Farm Coop, an Agenda 21 crime established as result of United Nations and Globalist mandates through Bush/Clinton/Obama admins.

From Fatal Rebirth, by this author; proparanoidpress: a fictional account of crimes of the New World Order from 1947 into the future, with over 1,500 footnotes so you may decide how much of it really is fiction, vs. reality in play. Based on the Unified Conspiracy Theory developed in a ten-year research for the book, it has correctly predicted political assassination efforts to effect control of the US election process, the downing of the WTC by passenger jets and resulting Middle East oil wars, and more. It also led to the author’s direct intervention in and prevention of one, and possibly two terror attacks on Portland, Oregon.

 
A FREE copy of the ebook (Vol. I of four volumes) is available for the asking. For more information, special pricing, go here
Why are Bloods and Crips Gang members being given Police badges?

23 Families Jailed, Loose Their Homes in Weekend Raids

A local news clipping (a sub chapter in Fatal Rebirth, Vol. III)

Police struck another blow against continued political and social unrest this weekend when they arrested 31 adults and took another 58 men, women, and children into protective custody in a series of surprise predawn raids ordered by Homeland Security. The actions were part of a continuing series of such raids across the nation undertaken in increasing numbers under authority of blanket bench warrants issued by the new FEMA Court System, a concept adapted from and empowered by provisions of the Patriot Acts and subsequent legislations.

The Multi Jurisdictional Task Force (MJTF) raids regularly involve elements of the National Guard, State, County, and local Police, and special Community Active in Policing Services (CAPS) deputized citizens as well as the usual Federal advisors, undercover operatives, and observers from DHS, FEMA, FINCEN, FBI, DEA, DIA, BATF, IRS, CIA, and numerous unidentified agencies.

Each Agency representative determines if arrestees were in violation of pertinent Federal laws or if there is any reason to suspect militia or terrorists activity or support. This time, the blanket bench warrants were served on the Corbin neighborhood where some 600 homes were searched Saturday and Sunday after roadblocks cordoned the area. There was little formal resistance from most law-abiding citizens, many of whom were given temporary shelter from the cold in the several motor homes set up for preliminary resident interviews. Coffee and hot chocolate was served by representatives of the Red Cross, who also provided blankets to those insisting on watching their homes being searched from the sidewalks.

However, gunfire punctuated several intense confrontations between agents and a few persons believed to be criminals or underground members of or sympathizers with the Constitutional Army of Repatriotization (CAR). However, these resulted in only minor casualties on both sides, and the Cobra gunship helicopters and heavy-machine-gun-mounted vehicles were not called into play as have been reported the case several times earlier this week in Detroit.

The statistics locally to date since declaration of Martial Law three weeks ago now stands at least 115 dead and 321 hospitalized, 7 of those injuries and two deaths being CAPS members and one DEA officer injured. At least 1,890 persons have been detained for questioning or actually arrested. The majority of deaths and detentions of non Islamics are attributed to armed resistors, presumably militia or criminal elements or supporters, or discoveries of significant contraband. Readers are reminded that possession of antigovernment literature is grounds for detention and questioning about loyalties and activities. The bulk of detainees are, however, apparently of Middle East origin, though no precise numbers are available.

Agencies conducting the raid were looking for weapons not already turned in during the amnesty period earlier this year, as well as illicit drugs, hoarding of food and fuels, proper travel documents and proof of citizenship, extremist and cultist materials, pornography and other contraband. Most of those taken into custody were taken immediately by helicopter to unspecified out-of-state Federal facilities for interrogation and possible ongoing detention.

Under recent revisions in the law in support of Martial Law, any charges resulting from the raids will be submitted to the temporary FEMA/FINCEN Court system operated under the US Army’s Judge Advocate system (military tribunal) for summary convictions instead of wasting time and money with the traditional drawn-out trial processes. If ruled guilty, their homes, vehicles, and personal properties will become the property of the State under forfeiture laws, with some of the goods to be distributed to the CAPS program managers for community enhancement. Most trials are in absentia with the defendants participating only by affidavit.

Elsewhere, Stevie Wilson, former member of the Bloods gang and acting spokesperson for the CAPS program described the raid as “rewarding in many ways,” and thanked the Police for giving them greater latitude in conducting searches… “It’s a lot easier for us to find contraband now that we don’t have all the procedural red tape that forced the Cops to oversee our every action directly.” Police discounted the usual charges made by those arrested that the former gang members had planted evidence and were only interested in confiscating goods they themselves would get to keep… “These charges are easy to make, but hard to prove. They can’t get out of it that easily.” offered an unnamed law enforcement official who, like many of the special agents, needed to protect his identity by wearing a black Ninja-style hood.

In a related matter, Mrs. Ira Johnson, wife of well-known newscaster Dave Johnson, has formed a new organization of housewives whose purpose is to help the progress of the searches proceed as smoothly as possible. The organization, called WELCOME, will urge all housewives to make their homes as easy to search as possible by using as much table space and floor space beneath tables and adjacent to furniture as may be possible to array items from within drawers and boxes, especially breakables, important papers, and valuables, to prevent damage and reduce cleanup afterwards. These steps, as well as placing the empty drawers on edge against the wall will dramatically speed search process. The organization also advises wives to urge their husbands to destroy objectionable and illegal materials in advance of searches for the sake and safety of the whole family, and to avoid embarrassing questions. See related story on page 6, Objectionable Materials List Broadened to Include Many Men’s Magazines. Raids will continue unannounced for several months until all areas have been searched at least once according to a FINCEN press release. At that time a special panel will convene to determine if further searches or other measures may be necessary.

Author’s closing comment: Is the above a future headline story? If you think not, reason out the visible signs. A small-scale version of this event has already taken place and is frighteningly close to that described, here. Such events are proofs which contravene arguments that ‘gun toters’ clinging to the ‘old fashioned’ ideas of the 2nd Amendment are ‘paranoid.’ Those so claiming are either blind to the truth of our times, or are working deceitfully for the very conspiratorial NWO agenda they pretend non existent. Even unfettered paranoia has a root cause in the real World, but they would deny that fact and have you think such fears imagined. 
 
The right to bear arms alone is the guarantee of all other rights, for as surely as absolute power corrupts absolutely, power without opposition grows oppressive. As intended by our wise forefathers, the 2nd Amendment serves as a check that our Government does not become too powerful and intrusive into our lives. Only when citizens are armed with weapons of like ability as the military and Police, does government fully understand that theirs is not the ultimate authority — that the people are their true commanders. Yet our politicians seek so-called gun control in the name of reducing crime and violence. Is that their true motivation? Do they achieve that which they claim as an end?
 
At the best, they merely address the emotion behind a desire for less violence — a desire fostered by a media-fueled notion that violence is on the increase while, in fact, a steady stream of statistics from FBI demonstrates it is on the decline. They seek in illusion to prohibit assault weapons which in fact account for a minuscule fraction of a percentile of all gun violence, while in reality depriving the citizen of the very arms required to make viable the 2nd Amendment. They seek in illusion to force criminal background checks at places where in fact, citizens buy guns, but criminals do not, while in reality providing a lists of citizens who own guns — the ultimate tool in seizing of power. These are not logical or viable actions, but rather, cover stories for covert actions against gun owners. Something beyond concern over violence is at work here. 
 
And a note on CAPS. As crazy as it sounds, such programs have already been experimented with in Houston and Los Angeles. Actual Crips and Bloods get Policd training, and a badge, and in some cases, were authorized to carry a gun and participate in Police activities, or become part of the Reserves. You used to be able to find information on the Web about it, but not for some time, now. It is documented in Fatal Rebirth.
 
And a final note on Internet censorship. If you do not believe Google, Bing, and the big corporate Web players are part of a conspiracy favorable to tyranny’s Agenda, try this: use your favorite search engine to TRY to find pictures of ANY MJTF raid. MJTF is a very well known acronym for Multi-Jurisdictional Task Force, and MJTF raids of all manner happen all the time 

1776 2.0 Cometh: What Price Treason, and Who Pays?


Gun Control Laws and other Constitutional/Bill of Rights erosions by government are TREASON. Ultimately, YOU decide who is going to pay, and how.

1776 2.0 Cometh
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Compare 1776 to 2012 and tell me where you live

What is the price of treason, and who pays?

Historically, the price of Treason can be unbearably high. If caught and convicted, the price can be as high as death, typically by hanging or by firing squad. In time of war, especially, and if that war be a revolution to throw off a tyranny born of such treason, the death penalty is more oft employed. Therefore, only a fool undertakes treason lightly; those who accept such risk must have great personal gains as their motive, else why the gamble?

But the cost is also high if such tyranny is not overthrown. If one is subservient to it without protest, or resistance is beaten down by it, the cost is loss of all Freedom, and often, again… the loss of life itself. For when government gives unto itself absolute power, it is corrupted absolutely, and free to deem any person at will as unworthy of life simply because they are seen as an inconvenience to whatever drives their tyrannical agenda. Yes. An example is called for:

Today, the person acting as President, through the NDAA Act, has, in conspiracy with those who voted for the Bill, usurped the power to take life and liberty with just a word; the tyrannical power of a 12th century King. When any one man establishes by manipulative means the power of life and death over fellow men in deference to all existing law, it is a crime. Treason.

Alex Jones was right, gun control means 1776 all over again

A line in the sand: when is 1776, 2.0?

http://www.earlyamerica.com/SOON, thanks to the push for gun control, when each of us must decide if we are subservient and wiling to be the ones to pay the price by  giving up our rights as well as the means to insure them… or if we will instead assert our rights and throw off the yoke of fascist rule of the New World Order by defending our guns in resolute defiance BY RULE OF LAW; the Constitution’s Second Amendment. That’s what it is there, for — it is not there for Duck hunting rights. It is that we might always have available Minutemen, and all who are able ought serve.

Heed my words, for I have been warning of this moment in time for more than ten years, starting with my bookset, Fatal Rebirth.

Note: Fatal Rebirth predicted Sept. 11 events in sponsorship of Middle East wars for oil. It predicted assassination plots against Ross Perot to kill the third party movement (indeed, mailed anthrax attack on his family would cause him to withdraw from the election the very night he would have won a place on the ballot and legitimized a third Populist political party). It predicted many things, including a series of mass shootings to enable gun control legislation.
 
It also predicted the next wave of terror attacks, including likely locations and methods, as false flag ruse to declare Martial Law, suspend the Constitution, and go door-to-door to collect ‘contraband’ and discover ‘terrorists’ (after our guns, mostly). But it also predicted how to resist and overcome such tactics, with specific advice to the Militia and others wishing to resist. You can get a free copy of volume I ebook by email to pppress at century link net.

I’ve written many posts about the coming moment, too, best described as that critical moment when each of us must decide if a line in the sand has been crossed which cannot be tolerated. Some of these posts are listed below, others are linked within this text. In one, I put it this way: government plays Russian Roulette and puts a gun to their head every time they undertake an oppressive or unconstitutional act, and pulls the trigger at its signing into law.

Eventually, they will go too far, and it will be yet another shot heard around the World; 1776, once more. It is, after all, how revolutions are started. An attempt to seize and restrict gun ownership is that line in the sand which must not be crossed, even at risk of escalation to armed rebellion. It guarantees not just one shot, but many, many, many more immediately thereafter. Only a fool would fail to realize that if any such revolution comes, those who are deemed as traitors will find it was as if there was a de facto bounty upon their head.

And from the very beginning, at the time the Constitution was penned, and the Amendments thereof brought into being, Thomas Jefferson and his patriot fellows warned this would be so: “The beauty of the second amendment is that it will not be needed until they try to take it.”

That Jeffersonian comment underscores the reason for its existence, which has NOTHING to do with the right to hunt or protect us from criminals, but everything to do with being able to protect us from government run amok. Our government runs AMOK, NOW, and has for some time. Shame on YOU for allowing it to go this far! Shame on me and you if we do not at last toe that line in the sand, standing firmly, side by side.

Are mass shootings simply false flag operations to take guns?

Let us be clear: what defines treason?

Treason defined on the fly by Mobs: Fascist Government Leaders (including Police officials) hung by the mobs when Mussolini was overthrown

Those in power define the answer, the wording of law not withstanding. I am likely now, or soon to be, like all dissenters, activists, and Constitutionalists, gun owners, and the like, as a single class targeted by a fascist coupe marching toward their New World Order, to be declared guilty of treason for daring to write these words. That’s the way Fascism works, and why no one is safe when it rules. But should 1776 revisit, and the People and Constitution win, WE will be the ones who define Treason. Here is my view of what that definition should be:

a) It is treason to swear an oath to uphold the Constitution while at the same time being a member of a New World Order institution which has their own oath to give up sovereignty in favor of a unified World government (which, ultimately, enables seating of the Antichrist). Therefore, a long list of governmentals are de facto traitors by virtue of lying when they gave their oath of office — while being members of the Tri-Lateral Commission, the Bilderbergers, the Council on Foreign Relations, Skull and Bones, or being a Rhodes Scholar, or similar.

These groups all require agreement to such contrary oaths or with stated globalist agenda, all of which is nothing less than rewording which conforms with the Illuminati formula for World domination, for which it was they who coined the term, New World Order. It is, today, very hard to find a Congressmen or other governmental who is not such a traitor, and the remainder look upon such groups as if wiser than their own ability to think for themselves, even to the point of accepting and acting upon their Globalist ‘reports’ as if Congressional findings. Treason.

b) It is treason to knowingly propose and vote for, and sign a Bill into law which is unconstitutional, or any Bill you have NOT READ and debated properly. Any act to subvert the Constitution, be it willful or by negligence, justifies the charge of treason, and let the defendant prove otherwise. Given that all such persons are educated in the law as a rule, one may safely presume there are no fools unaware of the significance, and the due seriousness with which their duties under their oaths of Office require of them to be diligent.

They undertook such acts at their own peril, and in full awareness of the responsibility to take care. So be it, when it comes time to answer for it. The list of such Bills is long, and many shall be held accountable. In fact, I can only think of two or three Congressionals who may be completely innocent, but there may, hopefully, be others. If not, perhaps the time for revolution is now.

c) To the point, here and now, today: ALL governmentals who support gun control laws which take away the right of the citizen to own military grade weapons are guilty of Treason. The Dick Act of 1902 made clear that the UNREGULATED MILITIA (that’s ANY citizen with a gun who stands to serve) shall NOT be denied the right to have military grade weapons. And yet, Congress has subverted this law time and again, by clever rewording of definitions, and the trickery of ‘dual oaths’ of service.

Therefore, all prior gun control laws which so inhibit access, or which create registration lists, are de facto null and void, and treasonous. Any attempt to collect weapons against the wishes of owners constitutes theft of private property on the one hand, and an attempted coupe on the other (treason), as does any attempt to prohibit or limit access, or to ‘register,’ anything with a Federal agency.

Personally, I want my own SAM and Apache gunship, thank you. I want all gun control laws repealed. The only law which I would approve is that to purchase a weapon, you would need be an adult of sound mind, and with no criminal record, to be determined by a blanket background check where the purpose of application was unstated, but authorized by the person being checked, as all background checks should be.
 
I only registration process should be to register guns, not owners: a registration process managed by the States which collects sample slugs from fired guns from sellers (the Registrars) for forensic comparisons in criminal matters. The State would not know who owned the gun, but if used in a crime, could obtain a warrant to get that information from the seller of the weapon. I further want colleges to offer firearms safety training courses as an alternative to ROTC, and as part of ROTC.
 
I want every State to have at least one citizen militia not subject to State control, and I want the State to provide them with access to military training facilities and expertise. I want every citizen who is qualified to own to be able to open carry or conceal carry. In short, I want to reduce the likelihood of criminal use of guns by means of practical and immediate (real and clearly visible) deterrence.
 
There are clearly other topics to be decided by law, such as matters of keeping guns away from unsupervised access by children, but I’m not taking up more space, here and now to totally define my views. If you want full details of how such a law could work, please request it directly and it will be made available by email.

d) All governmentals who supported NDAA are guilty of treason as well, for that law not only strips away whole sections of the Constitution, it even defeats the Magna Carta and gives the President the power of a 12th Century King to put citizens to death by mere say so (or torture or imprison them indefinitely without trial or evidence). Is that why DHS ordered 9,000,000 sniper rounds not for military use? That’s about how many dissidents there are in this country with a loud voice, such as myself, if I may be so bold.

e) All governmentals who support the DOD sending National Guard troops to war overseas without an Act of War and Congressional declaration of War are guilty of Treason. The Dick Act, again clearly denies the President or anyone else the power to order National Guard to active duty in any other fashion. They are NOT part of the regular Army subject to DOD. We have been fools to not be aware and hold both our STATE and Federal representatives accountable under the law their wiser forefathers set for them to follow.

f) All governmentals who support the endless spying and abuse of privacy of citizens at large in the name of fighting terrorism are guilty of treason, as are those involved in seeking the development and deployment of Political Control Technology (PCT) in like guise. Not only do they, and the 30,000 drones they want to put into our skies erode Constitutional rights and safeguards long cherished under the law, they make such protections meaningless. The very nature of PCT reveals their lust for totalitarian control.

Worse, they these things are a sham: they are not there because government fears a few thousand terrorists, but because government fears 360 million citizens, which is its RIGHTFUL state; the government is there to serve us at our pleasure, and be vanquished at our displeasure, not there to rule us at theirs, and subject to suffering their displeasure. Treason.

g) Any governmental who writes a law is also subject to the law, and thus any who violate the law and evade punishment by virtue of their power of office are guilty of treason. A government which violates its own law, as ours is so often guilty of doing, has no right to demand we obey their laws, doubly so when oppressive and unconstitutional. And doubly again when the person signing them into law cannot even prove citizenship to the simplest of standards. Such people make of The Law, something less, ‘the law,’ a mockery of no value whatsoever. I refuse to obey the law, but accept and follow only the Law of the Land (The Constitution)!

And let us not forget their oft cited caveat: we have recourse through the courts if we think a law unconstitutional. What recourse is that, really? When it can take a decade to work a suit through to the Supreme Court and cost millions of dollars, there is no recourse of practical meaning. When they can write new unconstitutional laws of like purpose ten times faster than we can negate an old one, there is is no recourse which excuses their writing them, and act of pure lust for power. Treason.

h) Media should never be allowed to be under control of the military-industrial-intelligence complex. It is so much under control, today, that I term it the Military-Industrial-Intelligence-Media (MIIM) Complex. When CIA puts thousands of operatives into media… when the top three TV networks are owned by military contractors (during the Flight 800 time frame, they were)… when a newspaper publishes the names of all gun owners and deliberately places their family, homes and the guns in danger… when ‘unafraid’ and ‘fair and balanced’ means ‘the truth is whatever government and globalists say happened, facts be damned,’ then those involved are guilty of Treason.

This list could be (should be) longer, but this is a blog and people don’t like them to be too long. So if they come for the guns and shooting breaks out, heaven help virtually any governmental captured, should the Constitutionalists and Patriots win out over ‘the law.’  So. Congress, and Mr. Obama, usurper King… spin the cylinder, put the gun to your head, and pull the trigger by signing that Bill. Let’s  see who pays, and what the price shall be.

You know where I live, and many more like me. You have lists of gun owners through previously written gun laws which should never have been allowed. But every citizen knows where all of you are, too. You don’t have enough Men in Black to get the 9 million activists before the rest of us come after you in numbers you can’t stop. You certainly don’t have enough to go after all 300,000,000 guns we possess… or is that why DHS also ordered 4.2 billion rounds or regular bullets?

What will you do when they come to your door to search for guns?

Who controls gun rights?

It is not lawmakers in Washington, D.C., who write illegal (unconstitutional laws) on purpose. They control only their own fascist rhetoric. The framers of the Constitution, and that document, are the ONLY authority we need obey. Even if you do not own a gun, the weapon Washington fears is in your hands; they fear a united WE, the PEOPLE.

Ergo; to lawmakers and other power usurpers and their minions of enforcers who disobey their oaths of office: I dare you  to try to take that weapon from our hands. Bring on 1776 2.0, if you must. Clint said it best. “Do you feel lucky, Punk?

Well, do you, Punk?

Note: the current proposed (Fascist Feinstein) gun law (clear analysis, here), will essentially force gun owners to give up the bulk of all pistols, rifles, and shotguns in a manner not unlike already undertaken in Australia. Those efforts resulted in a huge spike in gun violence as criminals were given a blank check knowing no citizen was protected by the likes of Mr. Smith and Wesson. We lost what? Well under 100 lives this last year to gun violence of the type the legislation claims to be defeating? Australia lost 93,000 lives to gun violence after confiscation, and their population is a mere fraction of our own. Yeah. Gun control works. It works for fascists and criminals (same thing, different levels of prowess and evil goals).
Do not obey illegal laws. Challenge authority. Stand on your rights.

 

12 Frightening New Questions Illuminate the Dorner Urban Legend


Just when you think you’ve heard everything about a major news event which suffers questions pointing to a conspiracy, someone figures out or finds something others have missed, or failed to see in the same light. I like being that person.
 
By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. 
 
12 new questions/veiwpoints addressed in this blog:
•  About the validity of physical evidence deliberately left at a murder scene;
•  About the validity of the ‘mental torture’ call to Randal Quan;
•  About the death of innocent bystanders;
•  About using a hotel on a Navy base;
•  About the million dollar reward?
•  About footprints in the snow, and the death of the one man with the answer;
•  About the ‘chance find’ by a citizen and a news crew of a James Bond-style assassin’s weapon;
•  Several questions about the Death of Chris Dorner.

Why Chris Dorner was murdered and framed

Questions?

mythbustThe Web is awash with questions and commentaries doubtful of the Dorner shooting, my own included. In my earlier posts, I’ve already addressed some of the same questions, and yet, have also come up with some new ones, or new insights upon existing questions. They are presented here in hopes they will help further illuminate the matter toward a better grasp of the truth — which sounds more and more like Dorner being set up as a distraction or cover up for something larger, something with Federal fingerprints.

The first postDorners ‘Manifesto’: Manufacturing a D.B. Cooper-ish Urban Legend?, analyzed Dorner’s alleged ‘Manifesto’ and showed a long list of reasons it appears fraudulent, whole sections of it written by someone else, thereby validating concerns that Dorner was a patsy and a conspiracy was in play. 

The second postDorner, the Urban Legend: Implications Behind a Fraudulent Manifesto, took a much closer look at the crime than most online treatments have employed. It provides deep-background information which suggests Dorner might have been a mere playing card in a high-stakes military or CIA project, possibly pre staging for a Martial Law sponsored coup. Ergo, the Ace of Spades graphic.

If you have not read these earlier posts, and are not comfortable with accepting the above descriptives of their content as viable concepts or factually accurate, please read them before reading this piece, or it will waste your time, as your basis of understanding will be in the absence of key information. Also be sure to review the excellent and revealing ‘related articles’ at the bottom of this page — especially the video interview relating Chris Dorner’s contacting alternative media and essentially confirming many of the points I’ve been making in my posts.

Was Chris Dorner a pawn in a Federal Plot?

Questions which point the way to understanding, even without answers

DornerMyth1) Dorner’s gear found at the first murder scene: Why would Dorner choose to leave Police equipment traceable to him at the scene, when said equipment would be valuable to ongoing operations if intending a killing spree? Curiously, there is video evidence that he did this. Someone who looked like Dorner, at least at distance in the poor quality view, in a vehicle which was apparently his (no definitive statement on that in reports, for some reason), is caught on a security camera dumping the items, including his badge and police uniform. Why would Dorner do this in front of a visible security camera in broad daylight? The murder took place at night time (see the news video report, toward end). There would have been cops already swarming the area, making it a high-risk adventure.

Why would Dorner even leave the gear at all? It would be valuable in any further covert applications if he was intent on continuing the alleged killing spree. It can’t be to deliberately ‘prove’ to Police it was him responsible: the call to Quan, a mere fingerprint, or a call to Police would have served as well and would be far safer. But it does make sense if someone was trying to frame him, sending someone who looks like him enough to pass for him, especially if borrowing his car to do it.

2) The alleged call to Quan by Dorner: If Randall Quan represented Dorner at the review hearings which resulted in Dorner’s dismissal, why is it only described in media references as a call from someone ‘claiming to be Dorner?’ Other qualifiers like ‘may have,’ ‘allegedly,’ etc., were almost always used. Would he not know Dorner’s voice?

Bear in mind that where a caller deliberately makes rude and insulting, emotional jabs at one’s psyche, the resulting change in mental state (anger, mostly) will deter one’s perceptions and judgement of such things. To me, it sounds like Quan was enough of a professional that he at least recognized the possibility of the voice not being Dorner’s, and must surely have couched his statements accordingly, else why did LAPD statements and media originally do so?

3) The death of innocent bystanders: If killing Monica was because she was family, as claimed by the manifesto, why kill her companion? Dorner should not have known he had proposed to Monica only days earlier, and Dorner has been repeatedly cited as taking care not to harm innocent persons. Likewise for the trainee with Crain. Why harm those men? Might it be because both men could have seen who the real killer was, a risk addressed by a killer who could not afford anyone saying it was not Dorner?

Kieth Lawrence, killed with Monica, can be seen wearing what appears to be a Police uniform in some online photos, but he was not a Cop. He (article) had been a security guard at a Universtity, and had undergone trainings with Ventura County Sheriffs and Oxnard Police, but should have been seen by Dorner as purely a — he was NOT wearing his guard uniform at the time of the shooting, and thus was unarmed. Many accounts say there is evidence (?) Dorner stalked them both for some time, so surely he would have known Lawrence was not with any LEA, certainly not LAPD.

It is also interesting that both were shot multiple times. In fact, so many that reloads would have been required, or for gun grabber’s edification, a high-capacity magazine was used — or — unless there were two shooters.

5) A hotel stay on a military base: Why did Dorner go the Naval Base at Point Loma (San Diego — see timeline)? It was confirmed that he had been in a hotel ON BASE and the base went into lock down when someone reported seeing him. Could it have been an attempt to meet someone who might provide him with evidence he was being framed, or something useful as a blackmail insurance policy to force (someone high up) to call off the dogs?

6) The million dollar reward: Why (and how) was a $1M reward arranged for so quickly, and who really managed that hat trick, when normally, $20K is the most anyone ever sees pinned to their name, and only after much time has transpired since the manhunt began? Only bin Laden and associates have, to my knowledge, enjoyed that level of value on a wanted poster, and so quickly. This article seems to have a convenient but implausible answer (just above second video); a collective of leaders from the area including businessmen ‘came together.’ Really? When does that ever happen, elsewhere?

7) Footprints in the snow, and the death of the only man who knew to track them: How convenient is it that the final standoff comes to pass because two officers ‘track him’ to the cabin… and one of them is fatally shot to death — a super-cop sent on Dorner’s chase like a bounty hunter? The other was wounded. Jerimiah MacKay, killed at the cabin, was a 15 year veteran of the San Bernadino’s Sheriff Dept. His specialty was going after stolen cars. He was on Dorner’s case from the outset, but fared not better than any other Cop. But in less than four hours after a truck was reported stolen by someone matching Dorner’s description, he and his partner were tracking footprints in the snow to the Cabin. Excuse me, but how did they know to track these particular footprints?

They had NOT found the stolen truck, so how and why did the presume these to be his footprints, or even know they existed, and where? NO ONE had ever seen Dorner alive near the cabin, nor any other person who might have been responsible for the footprints they choose to follow, nor, for the matter, whoever really fired the shots that felled them. Next came an swarm of lawmen and choppers, and the Cabin was set afire. Restating the question more pointedly, how did the dead Sheriff know to follow the footprints, unless there was some foreknowledge; a conspiracy afoot requiring Dorner’s body to be found cindarised? Now that he is dead, we may never know how he knew how to find those footprints, and why he knew to follow them.

8) The finding of a murder weapon by a citizen and news crew: A man reportedly found a crashed car (not the truck allegedly stolen by Dorner just prior to his being cornered) near the cabin, and nearby laying in the open in the snow at the roadway’s edge, a Walther P22 pistol with silencer and flashlight (a James-Bond style, professional assassin’s weapon). Coincidentally, a news crew happened along just then, as well? And they thought seeing a man standing at the side of the road was obviously newsworthy enough to investigate and interview?

This is three days after the Police the Cabin was fired and Police had swarmed into the area, and the day after concluding their investigation in the area, opening roadblocks to the public. Anyone see red flags here? If not Dorner’s truck, who’s car was it, and who’s gun? If Dorner had somehow stolen a car after stealing the truck, why has it not been reported? The car renews interest in and underscores the question about how MacKay choose to follow footprints, and where they originated, not just where they led. It is also raises the possibility that whomever killed MacKay was not Dorner, but a professional assigned the task.

9) The death of Chris Dorner: Was Dorner dead already, killed at some point well before the cabin event? It would be easy to have staged the events leading to the fiery conclusion, especially if one man knew to follow the footprints to the Cabin preprepared with Dorner’s body and rigged with squibs to simulate gunfire. It would only take a sniper to eliminate that man, the one possible person who might know the truth or unknowingly expose it if allowed to live, perhaps the only one outside of any inner conspiracy circle within LAPD or CIA/military camps.

10) The tale of four sets of ID, three wallets: How did the wallet survive the fire, and how many wallets and ID sets did Chris Dorner own? There had already been multiple reports of his wallet and ID being found, and yet they also find it, in tact, with readable plastic ID, in the ashes of a building where nothing else survived the flames. Add in the discarding of his badge as yet another form of ID. I DO NOT BUY IT.

That is specifically one of the oldest tricks in the intelligence community’s playbook for framing someone or making it seem that a body is someone it is not. Yes, it can also be used to misdirect authorities as to your true presence or whereabouts, but you only need employ that gambit generally once, and even then, only when making a major tactical move (like an escape, or an assault). Four times? Not synchronous with either escape or subsequent assault? And so close together in some cases, essentially wasting valuable ID resources?

11) The body of Chris Dorner: Is Dorner even dead, at all? If it were not for the phony ID find, I might not be moved to ask. But it implies official deceit. So, is he alive and vanished by virtue of NDAA style actions by our acting President or a unilateral military decision, or has he managed to pull off his own escape plan? I doubt the later, but even the Coroner’s report of dental matches, or DNA match will not be proof enough to answer the question; given the weight of material pointing to conspiracy, a fraudulent Coroner’s report is simple to arrange if CIA is involved, and easy enough for lesser groups.

12) The fire and ‘suicide’: Why did, per police radio traffic, LEA deploy multiple fire-starting ‘burners,’ incendiary tear gas canisters, if not intending to start a fire? Why did they turn away fire trucks with a decision to wait until all four corner’s had caved in once learning there was a basement? In almost every use of this kind of device, a fire erupts if it lands on or against anything flammable. Using multiple burners insures a fire. Was it to make sure the only way to ID Dorner’s body was dental records, the easiest of all to tamper with when officially faking someone’s death? Was it to insure that Dorner never had a day in court where he could expose crimes by LAPD or others well beyond those already known?

Bonus Question asked by others re Media complicity: Why did media volunteer to black out the Dorner event already underway? Choppers in the air pulled away at Police request issued thru FAA (suspicious and completely unprecedented in its own right), because Police claimed ‘news coverage might tip Dorner off.’ Excuse me, but the gun battle had already ensued, and the cabin was already surrounded. Police positions were not clearly revealed by aerial video because of dense trees about the cabin and the distance and angles involved. So what was the threat, again? If Dorner didn’t already know he was surrounded after engaging in a gun battle, he was not likely to be watching TV to find out.

And how do you get a TV signal way out there to the Cabin, in an isolated valley, when the cabin had no TV aerial visible, and the nearest broadcast station carrying feeds were in LA, 67 miles away on the other side of mountains forming the valley? What was the real reason Police wanted no one to see document they were doing? Why did media comply, knowing their signal was of no value that far away? Why did FAA aid in that cover up?

Why was an assassin’s pistol found by civilians near the cabin after Police finished investigation?

Summary

All these question and nagging discrepencies are the stuff which makes for an Urban Legend. Remember, an urban legend is always based on some kernel of truth, and yet is almost never truly what it seems on the surface. People tend to believe the legend, and fail to ask the right questions even if choosing to look closely. Dark lies need to be exposed and examined carefully in the light.

In looking closely, ALL of the above questions imply their own answer: a conspiracy, lies, and intelligence community tricks being employed. Whether those tricks are by CIA, military, or LEA application is something only the answers to the questions will reveal. But you (in bothering to read this), I, and other ‘conspiracy theorists’ seem to be the only ones asking questions. Given the obvious nature of many of them, that is its own clue something is wrong, something quite related to the bonus question. Anyone not seeing that, is not paying attention.

Turn on the damn flashlight!

How did Police find Chris Dorner?

1.4 Billion Ammo Orders Use Satanic Magic Numbers


When satanic leadership of the NWO undertakes a plot, you can bet there are satanic magic numbers in use, somewhere. Sometimes the obvious is right in front of our eyes, if we but just look askant.

Homeland Security (patch) Police (helmet)? Why does DHS want Mine Resistant Behemoths like this in your city?

Why did DHS order 1.4 billion rounds of ammo? Satan made them do it!

Updated March 6, 2013, and errata:  A previous update of this same date was in error as it implied DHS had ordered 2,717 MRAPs. Claims do abound on the Web that DHS’ has also placed a recent Order for 2717 MRAP (Mine Resistant Armor Protection) Light-Armored, Gun Ported Vehicles also uniquely satanic. However, the order was actually via U.S. Navy conduits and are intended to be manned by the U.S. Marines, presumably in overseas operations — but of course, deployment can actually be ANYWHERE.

Regardless, the smoke comes from fire theory is fueled by the fact that DHS does use the same vehicles (image) and has their own Police Force (ICE ERO — Immigrations Customs Enforcement Emergency Response Operations). If you go to ice.gov Web site you indeed find them crowing about numerous ICE ERO arrests in civilian police matters unrelated to either Customs or Immigrations. Ask yourself then, why does DHS want these vehicles and Police (soldiers by any other name) otherwise illegal under Posse Comitatus in YOUR city? Updated analysis marked via RED text.

Is DHS a Satanic branch of the US government?

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice.
Did Satan make DHS order 1.4 billion rounds of ammunition?
Does DHS have its own Police force?

What you will learn reading this blog:

•  That all numbers have meaning, sometimes spiritual, even satanic… and magical;
•  That the magic numbers are easy to find and translate, by way of example;
•  That the DHS munitions orders are rife with satanic numbers and meaning;
•  That that meaning implies they will be used against citizens and destroy the America we know in favor of the North American Union.

What does the DHS munition order have to do with the North American Union?

One indicator that the DHS 1.4 gigamunition orders are intended for pure evil use may be the actual quantities ordered, themselves. When the Satanic leadership of the NWO makes plans, they use every Satanic leverage they can muster to insure success. Magic numbers are almost always present one way or another. We got a taste of that on Sept. 11, 2001, and other black days in history where the date itself forms magic numbers. Yeah, yeah —mere coincidence, right? Don’t be so sure; read on.

What is a Satanic Magic Number, you may ask?

Transcendental, omnipresent, and as mysterious as it is infinite: the number pi

Transcendental, omnipresent, and as magically mysterious as it is infinite: the number pi

To answer that, we need to go back to ancient times and consider the dead languages, such as the Greek, Hebrew, and Latin. In those times, each letter of the alphabet had a numerical weight or value associated with it. The best known by most of us are termed Roman Numerals, but all these languages used such a system. Thereby, a given word, phrase, passage, or text document could have a numerical value by simply adding them up. That’s one reason the name of the Antichrist can be given as a number.

Also prevalent in those days was the occult practice of Numerology, the belief that each number carried with it a social and religious meaning or importance, a functional word/phrase equivalent. Numerology as pertaining to religious use was largely associated with cults and early Satanic religions, but also, even Biblic texts rely upon numeric valuations. Typically, the ‘meaning’ of a given number remained constant between the dark (Satanic) and light (Biblic) uses, with minor changes to suit emphasis or application.

By such a scheme, it is possible for a number series to be converted to a sentence-like translation or summary of its meaning. We will be doing a little of that, later on. In reverse fashion, one practiced in numerology can devise a number to have such a translated meaning. In addition, there are certain number properties which are thought to hold magical abilities which amplify the power or intensity of any such meanings. Doublets, triplets, and so forth, perfect increment/decrements (e.g. 1234), squares or other root products, and palindromes, those numbers which are the same forwards and backwards, and even prime numbers divisible only by 1 and themselves, are examples.

Note: If you find this interesting, you may also want to learn about the Gematria Calculator, which translates numbers to words and vice versa. The link also provides additional background details to the above presentation.

What is the history of magic or satanic numbers?

Machinations for illumination

The means of manipulation to relate magical translations has some flexibility. The number sequence 123456789 can be looked at for the purpose as a single 9 digit  number, or three three digit numbers, or it can be broken into pairs with the odd man out at either end, or in the middle. When in the middle, groupings both left and right of it may incorporate it for ‘double duty.’ Groupings can then be summed to obtain other numbers to be employed for translation purposes. Thus our example number in groupings of threes would become 6 15 24 as a result.

Sum results can also be summed yet again. The most common form of summing, however, is summing in strict pairs, which is a bit different. Summing our example result 61524 (not in pairs) would produce 45, the actual sum of the three numbers, but in pairs, it produces yet a new three digit number, 666, the most powerful of all Satanic numbers for obvious reasons: 6 is treated as if a pair, 15 sums to 6, 24 sums to 6. The other way to sum is to simply sum them all as individual digits, which yields 18, another code-like way to express 666 (3 x 6 = 18).

A thing to do, especially with larger numbers, is to review their table of divisors; all possible combinations of division the number supports. The quantity of divisors can be examined, as well. The only useful divisors would be those found magical themselves, and especially so for the more important Satanic numbers, 13, 18, and 666, or multiples thereof, or numbers which yield them by the above machinations. Indeed, there are many means which can be applied, but regardless of the method, the interesting fact is that the odds of being able to discover a magical meaning to any given number of some size (e.g. 5 or more digits) is relatively small, despite it being easy to find magical numbers by the described means. Restated, it is easy to find magic numbers, but not easy to find magical meaning; more is needed to impart meaning and actual power.

Only a few specific numbers in a given range (e.g. 10100 – 10200) would have much going on in terms of useful magical impact. 10100 can be argued a magic number, for instance, because it has the doublet 00 and the palindrome 101, and is based on the the number 1 which has a significant meaning in its own right (primal force). But that is not enough — and yet is tantalizing enough that we ought look more closely.

Indeed, if employing the divisors method, we find it divisible by the doublets 1010, 2525, and 5050, and the additional palindromes 101, 202, 404, and 505. If we cared to do so, we would learn these numbers have meaning of their own. Thus it turns out to be a magical number, but yet, it is not Satanic (the meanings are good, not evil), and therefore of no value to our search — unless we encountered an ammunition order in that quantity, in which case we might deduce it for a good cause. We do not, and should not find it, in that those seeking good are admonished in the Bible against using numerology, and thus it should be only by coincidence or divine providence that they would have elected a good number.

Who uses magic or satanic numbers?

Not just any old number will do

The important thing is, finding a Satanic number is not common enough that one can argue ‘any number can be shown Satanic.’ In our sequence above, one does not encounter a number with the potential for even a mild Satanic interpretation until 101124, which is able to produce the number 18 in machinations several different ways. Even so, it is not sufficiently dark to be used for justification, because it does not enjoy any of the other requirements:

It must afford an actual translation which imparts a meaning, and/or, alternately, enjoy a symmetry or consistency as if a ‘theme,’ and/or, alternately, offers a myriad of such finds employing a wide variety of magical numbers; it should tend to be somewhat obvious and clear cut in nature. If it does not hit you over the head, it’s probably not intended to have magical meaning… unless, perhaps, it is part of a set of other magical numbers where one might deem to look for a theme within the entire set. That complexity, fortunately, is not required with the ammo order, as each number appears to express itself, alone, and as a whole, the entire order’s theme is also consistent with any individual number’s meaning.

Indicators are indeed everything. In numerology, select numbers were deemed to represent good, and others, evil or occult, meanings which could be used to reference conceptual constructs, events, outcomes, traits, or even objects or persons, etc. You can learn about any (usually limited to two digits) number by typing into your search engine, ‘what is the meaning of x,’ substituting your target number for ‘x.’ Some references will focus on positive spiritual uses, some on general Numerology meaning, and a few will focus on occult uses. However, even the spiritual and less blatantly dark Numerology definitions will paint a useful picture in most cases. Try several resources.

One must not discount the opposition, either. If truly seeking translation, one must expect to find a mix of good and bad magic numbers. For example, if the message were intended to be something along the lines of ‘Satan destroys god’s plan for man,’ it might look something like 18 (Satan) 11 (destroys) 27 (salvation) 181127. That number contains a palindrome 181, which sums to 99 in pairs (using the middle number in an odd digit count with each number to its left and right), which again sums to 18, and the last four sum to 11 yet again collectively. The first four sum to 13 (sin), the mechanism by which Satan destroys salvation. The theme is present and expressed several ways. So if I was an evil Mason designing a Temple or other building of mystical import, I might make sure to employ that number and others like it in the dimensions (e.g., expressed in millimeters, it equals 594 feet, where 594 sums to 18, 94 sums to 13).

How are magic numbers used in the real World?

Real World example

Indeed, we find precedence. There is in India one the tallest buildings on the sub continent which is of that height, called Planet Godrej. Godrej is an Indian personal name which translates/relates to the occult Zoroaster metaphysical faith, also known as Zarathrustra, an ancient Persian occult faith (oldest on Earth) of mythological importance to the ancient Egyptians, and therefore, to Masons. The name is historically associated with wealthy business families worshiping Zoroaster. Remember Ghostbusters, the movie? The evil from the other side in the film was based on Zoroasterism.

Thus Planet Godrej might be intended, by its designers, both by its name and its dimensions, to represent diversion of Man from Salvation by means of sinful business efforts, planet wide. What is the building actually used for? It is a luxury apartment complex catering to wealthy business leaders in the heart of Mumbai (Bombay), each replete with servants quarters. It is located in an entertainment district which includes gambling. There are only two other buildings of the same height in the World cited on the Web: a similar residential building for business leaders in London, the Vauxhall Tower, and one of the five Suntec towers in Singapore. Vauxhall is a name derived from the Russian pleasure gardens of the Tsars, a place of diversions from mere amusements to outright sinful sexual excesses for business and political leaders in Russia. The Suntec towers are part of Suntec City, a complex of business office and convention spaces, residential, and entertainment facilities. See any themes, here? I don’t make this stuff up, you know.

What numbers are satanic?

Meet our magic numbers

Here are the numbers we will focus upon for our purposes, today; those numbers most used to represent Satanic dialog/themes, or to clarify them — in the simplest and briefest of summaries. Note there is some translation taking place in the larger numbers employing the smaller number’s meanings, so you see how translation can take place with consistency. Those few in bold are the true Satanic numbers of power.

  3  Fullness
  5  Balance, the power and limit of man to control 
  6  Illumination, enlightenment, legend, man
  7  Mystery, esoteric or scholarly magic, associated with Saturn, a name for Satan, might be a curse
  9  Visitation, spirit
10  Law, obedience 
11  Imperfection, disorder/chaos, that which precedes destruction
13  Rebellion, depravity, sin
16  Material power, incarnation
15  Three dimensions (reality), new direction, blinding temptation (Satan)
17  Victory, Son of Man (Christ), liberation
18  Oppression, bondage, slavery  = 3 (fullness) x 6 (legend/man/illumination)= 6+6+6 = 666
21  Distress = 3 (fullness) x 7 (mystery, magic – a curse)
29  Departure, cast out = 3 (fullness) x 13 (sin)
30  Rulership, dominion = 3 (fullness) x 10 (law, obedience)
31  Offspring, branch
33  A sign, warning, predictor = 3 (fullness) x 11 (that which precedes destruction)
36  Adversary, enemy = 2 (division, double) x 18 (oppression, 666)
39  Infirmity, death = 3 (fullness) x 13 (sin) — the wages thereof
360  Encircle, trap, capture = 10 (obedience) x 36 (enemy)
666  Satan’s name

Now to the analysis of DHS ammo orders with the above in mind. To follow along and be comfortable with my findings, you may wish to open another window or tab to a divisors calculator, and to activate your desktop calculator. The divisors calculator additionally gives you the sum of divisors, often of value in the analysis. Because there are so many numbers which might be analyzed, I will simplify the presentation by focusing on the first number (which happened to seem to be the least magical on first look), the largest single order item, and the final total. You will then be well versed in how to check any of the other numbers on your own. Since it can be confusing to describe mathematical things verbally, I have also attempted to employ color coding to help you more easily see what is being referenced.

How do you find magic or satanic numbers?

The first item: .223 Assault Rifle ammuntion, yr 1 35635000 rounds

Sum of divisors: 83504520
1 2 4 5 8 10 20 25 40 50 100 125 200 250 500 625 1000 1250 2500 5000 7127 14254 28508 35635 57016 71270 142540 178175 285080 356350 712700 890875 1425400 1781750 3563500 4454375 7127000 8908750 17800 35635000

Bold = palindrome  Red = 13 sum  Green = 16 sum   Blue = 17 sum

At first I did not see too much going on with this number other than it was an unusual palindrome, 35635, and that the divisors contained three of those as well as three 17817 series (e.g., 178175). But the sum of divisors (83504520) proved interesting, too, when run through the divisor calculator: its 13th divisor is 18. It’s 57th divisor is 360 (entrap), 57 summing to 13, as well. Then, looking at the last three digits of the 178175 series, we find they summed to 13, also.

If this was all there was, I still would not have bothered going any further in my hunt, concluding there was insufficient magic present. A weak theme of 13 with a hint of 18 in play was not exactly ‘saying’ much. The hypothesis would have been found inadequately proven, and this article would not be warranted.

However, when one checks in groups of three or four digits, one quickly discovers that a large number of divisors, including half of those with 13 present by summations, almost always summed to either 16 or 17 either as a whole, or as a balance of digits in the case of those with 13 present. In total, there are six each 16 and 17 summations, three of the 16 conjoined with a 13. Thus the ‘theme’ would seem to be 16 (incarnation) of 13 (sin) is greater than or opposes 17 (salvation). In this case, it can be made greater because the conjoined instances are all palindromes, although, the odd number remaining 5 (balance), implies a balance of power is being contested.

Now, going back and looking at the original number 35635 again, we can see that 35 is 5 (balance, limit and power of man) x 7 (having to do with magic and Satan). This is another way of saying the same thing (balance of power in conflict). Further, that converts it to 57675, which can be summed in triplets to form the doublet 1818. Again, very powerful and weighted to Satan’s advantage against Man and Man’s salvation. With the same general theme being found expressed three different ways, I elected to write the article; the numbers said something after all.

DHS orders ammunition in quantities based on Satanic numbers.

The largest order: .223 Assault ammo, yr 3 728582000 rounds

728582000  728582000  728582000  728582000  728582000

Sum of divisors:  1761716112  1761716112  1761716112  1761716112  1761716112  1761716112 
1 2 4 5 8 10 16 20 25 40 50 80 100 125 200 250 400 500 1000 2000 364291 728582 1457164 1821455 2914328 3642910 5828656 7285820 9107275 14571640 18214550 29143280 36429100 45536375 72858200 91072750 145716400 182145500 364291000 728582000

Bold = palindrome  Red = 13 sum  Blue = 17 sum   Purple = 18 sum  Pink = 15 sum  Teal = 10 sum

Again we see palindromes richly present. The order quantity itself contains 858, which by sums translates to doublet 13, very powerful. The larger palindrome, 28582 likewise summed provides doublet 15 (temptation in spades). The sum of divisors is even more palindromic, containing 17617 as well as 171 and 161. That provides for one 13 in the former, and if summing the later together, provides 17, plus the outright 17 in one of them (171), and 17 by summing of the other (16+1). Then we also find a single number with two palindromes: 5828656, its first two  numbers summing to 13, second and third to 10, the last three to 17, the first three to 155828656  5828656  5828656

We find 13 is also present by summing in four divisors, each an ‘island’ without conjoining. However, 17 seems to be everywhere, in each instance conjoined with 18, 15, or 10, and in like manner, 18 is abundantly conjoined with not only 17 as just mentioned, but also 10. Indeed, the order quantity palindrome also contains two each of not just 13, but two each also of both 15 and 10. That’s a pretty potent palindrome.

In checking the divisors of the sum of divisors, as in our first year order, we find the number 13 pops up, this time rather than in the form of being the 13th divisor, it is divisible by 13 directly, which goes 135516624 times. That not only starts with 13, but contains two adjacent 13s by summing: 1355 16624, as well as containing 15 and 18 (135516624) by sums, or outright 666 if summing just the last pair, and 17 two ways by dropping either 1 in the first sequence. You also get 666 summing the 51 ahead of the 66, and of course, 55 gives you 10. All the key numbers are present in the one number, which is multiplied 13 times to amplify its dark power. 

In almost identical manner, the palindrome 45536375 from the original divisors does the same, in overlapping combinations: 45536375 (17 15), 45536375 (17), and 45536375 (10), and 13 in the 553. Only 18 is missing in this one. Now go back to the actual order number, and you see it happen similarly, yet again: 13, 15, 17 and 10 are all there. From all these we deduce a consistent (three-way depiction) of a theme dialogs: 18 (slavery, Satan) vs. 17 (Son of Man) = ‘conflict’ or ‘battle;’ and 17 (Son of Man) vs. 15 (change of direction, blinding temptation); and 10 (obedience) through 18 (slavery, Satan).  These same themes have been repeated four times in this one order item!

Combining these, and we get the picture of a battle of some sort on an epic scale. Considering that we find 13, 18, 17 are the only ones which also stand alone (rebellion, liberation, slavery), it appears that is the nature of the conflict is to be a rebellion to decide between liberty or slavery.

DHS orders ammunition in quantities based on Satanic numbers.

Grand total of all munitions: 1405175654 rounds

1405175654  1405175654  1405175654  1405175654  1405175654

Sum of divisors: 2108519640
1 2 2819 5638 249233 498466 702587827 1405175654

Bold = palindrome  Red = 13 sum  Blue = 17 sum  Purple = 18 sum

Because the number becomes considerably more finite when it does not have a lot of zeros, we get very few divisors, and thus it becomes ‘harder’ to find magical numbers since there are fewer to consider. However, they are present. The quantity itself contains both 18 and 13 two different ways, and we do have one palindrome, and 17 exists outright, only mentioned because it will be omnipresent elsewhere.

The first two four digit divisors if summed in pairs, produce palindromes: 1010, and 1111, respectively. The next two divisors both contain a summed 13 (49), and the later of these can also produce 18. The next divisor produces a 13 in addition to a palindrome. We also find that most of the divisors contain 17 by summing: 5638, 249233, 498466, and 7025877827.

But we are not done. If we also compute divisors for the sum of divisors, we find some more interesting things not common to similar efforts with the other numbers. We find a wealth of palindromes. In fact, more than 20% of them have palindromes, including a 5 digit 67976, which makes for a doublet 13 by summation. There are numerous doublets, many numbers containing multiple doublets, including 4040 (40 is the number of death and rebirth, or destruction and renewal).

That number, 14954040 also contains both 13 and 18 in sums sharing the 495.  There are even very rare triplets, including 666 itself — twice! The other triplets, 333, and 999, additionally contain 13 in their construct. Like the original number, 13s and 18s also abound in many different ways. The overall theme for the entire order, then, is 13 (sin) amplifying the power of 18 (Satan) against 17 (Son of Man).

Who in DHS wants to overthrow the US by force in favor of the North American Union?

Update: 2717 MRAP vehicle order

Sum of divisors: 3360. 8 divisors:
1 11 13 19 143 209 247 2717

Bold = palindrome  Red = 13 sum  Blue = 11 sum  Purple = 18 (666)

A palindrom (717) starts this off, which sums in pairs using a shared middle number to the doublet 88, and we have a doublet 33 in sum of divisors. Both Doublets are divisible by 11 a number of times (3, 8) which sum again to 11. Still, not that much to crow about until we look at the divisors, of which there are very few, and yet which provide a wealth of results in EVERY divisor of note. The order is divisible by 13 209 times which sums to 11, and divisible by 11 247 times which sums to 13. It is divisible by 19 143 times which combine in sums to 18 (666). So, just look up 11 and 13 to get the ‘theme,’ and amplify that by 18.

Why did DHS order 2717 MRAP vehicles?

Summary

Therefore we see the simple outer theme, inwardly, concealed if you wish, expresses an overall theme akin to Armegeddon, or the Great Flood, to be visited upon America. But also, you see… if the NWO has is to its way and be able to establish a one-World government, the true purpose thereof is to seat the Antichrist, and lead us to the final End Times, actual Armegeddon.

But to get there will require something called the North American Union, abandoning the independence of Mexico, Canada, and the US altogether. But the greatest roadblock to that is the United States and our massive gun ownership which binds us like an insurance policy to our sovereignty and Constitutional integrity. Unless they can find a way to cancel out that insurance policy, they cannot have their way. The North American Union cannot come to pass without something drastic happening.

The numbers suggest they may at least think they have found a way to solve that. A bloody way. In fact, the sum of divisors of the grand total is equal to (270 x 13) + (3165945 x 666). Various sources cite the number of guns in private hands in America is 270 million. 3,165,945?  That’s just about the size of the US Military and Police forces, combined, depending on who’s numbers you use.  But that’s just me and some numbers talking.

How can the North American Union come to pass?

What do you think?

Support the second amendment if you hate the North American union!

Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto


What would it really mean if Dorner did not write the Manifesto claimed for him? Like many bumps-in-the-night mysteries in our national consciousness… the answer may lead to CIA and the Military.

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. The image is specifically excluded from permissions to duplicate: see text with image.
Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto
 

What you will learn reading this blog:

• That there are more, darker possibilities than the obvious bad Cop framing a good Cop;
• that possibilities include direct ties to Rodney King and Operation Verdict in support of Martial Law for a military coup;
• that CIA has infiltrated LAPD (and most major LEA) for their own criminal needs and may be at the heart of Dorner’s fate;
• that there are many clues most of us have missed which foster TEN new questions which help understanding;
Did CIA or Military frame and murder Dorner?
What is the truth about Chris Dorner?
This original artwork is trademarked and copyrighted and may not be used in full or in part, altered or unaltered, without permission, if dissociated from this blog: I do not want some bad cops turning the left-half into some kind of macabre T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

This original artwork is trademarked and copyrighted and may not be reproduced in any form dissociated from this blog in full or in part without express permission: I especially do not want some bad cops turning the left-half into some kind of racist T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

In my prior blog post in this series, I showed more than a dozen reasons to question if Dorner’s Manifesto were his manifesto, at all. While portions were surely written by him, it also seems clear that because of different writing styles and the very construction employed, as well as external evidences relating to the security of Dorner’s Computer activity — the sections which paint Dorner as a mad killer were by someone else. I’m not the first to suggest it, but perhaps the first to fully dissect and expose. Without those additions, all you have is a laundry list of LAPD wrongdoing and an open letter to LAPD pleading for resolution by a perfectly good Cop.

If we agree that there is reason to question the authorship of the condemning portions of the document… then we have to wonder what else about the greater Dorner matter is real?

There had to be a motive, and a pretty powerful one, at that, to warrant setting Dorner up for murder and feeding us lies. So much of Dorner’s laundry list of LPD sins ultimately translate into or directly relate to racial prejudice. Dorner cites everything from racial slurs to violence, specifically mentioning the Rodney King beating/video to show how systemic it has been. But this cannot be the motive, in my opinion.

Racist Cop complaints are, within LAPD, a small-potatoes issue representing little ‘threat’ sufficient to motivate the fraud and murders involved. LAPD, even as Dorner points out, has a long history of such prejudice and covering ups. When leadership habitually protects those who step out of line in this regard, there is no threat worthy of the death penalty in yet one more accusation, even if by a fellow Officer. We are moved to think it has to be something else. Or does it?

Was Dorner a CIA or DOD patsy?

In the game of Hearts, playing the Spades can steal the whole deck

In the game of political power and control, it is our Hearts and minds which are at stake via psychological manipulation of the masses. The closer you look past the thin and faulty veneer of the Dorner story, the more the clues we find which lead us not just to bad Cops in LAPD, but also, unfortunately, to the CIA and Department of Defense and very dark things that threaten to impact us all. So hang on… this is a far bumpier ride than the manhunt we see on the surface.

As I document in my bookset, Fatal Rebirth (new special low price offer in place, by the way), the 1992 Rodney King beating Dorner was careful to cite — had led to CIA reconnaissance overflights of major US Cities to perform low-level, high-resolution aerial photomapping of black neighborhoods for something called Project Verdict. Verdict was preparation for the declaration of Martial Law if rioting broke out nation-wide when the trial of the 4 LAPD Officers involved was concluded with an expected white-wash verdict of ‘innocent’. So concluded, it was.

And based on a lot of indicators, it was planned that way from the start; a plot to overthrow the Constitution.

But it failed, though LA indeed became a battle ground like never seen in any American City, requiring the National Guard AND US Marines to restore order. 53 died, more than 2,000 were injured, and nearly 4,000 fires leveled whole neighborhoods and cinderized over 1,000 businesses. Had other cities followed suit, the whole deck of cards would likely now be under military control, exactly as forecast by our highest ranking military in the event of nation-wide martial.

Now know this: in the time frame of the beating, trial, and aftermath, King was reportedly described by various officials predisposed to rude thoughts as the ‘King of Spades.’ Also active World-wide at the time was Operation Gladio (still in play, today, it seems), a US/NATO clandestine effort to topple Communist Bloc nations which further evolved to include a series of false flag terror events targeting Americans and NATO citizens to justify repressive draconian responses. Was Verdict part of Gladio? No way to know, but it sure fits the mold.

Fortunately, Verdict was thwarted. But I have to ask: was it intended from the start to foster a military coup? POTUS in ’92 was an old CIA man, George Herbert Walker Bush, a man tied to many of the darkest of bumps in the night America has ever known, from JFK to Watergate, and beyond. An excellent review exists in book by Pete Brewton, The Mafia, The CIA, and Goerge Bush, intro here. Gladio was under his watch as CIA Director, and while in the Oval Office.

1992 was a hotly contested election year, and conspiracy rumor mills of the day were warning that a military coupe was in the making to insure Bush held office; under Martial Law, the election could be cancelled. Rodney King may have been the key to such a plan. Absurd? Perhaps, but let’s consider it for a moment, anyway:

Bush was running for second term against Clinton and billionaire H. Ross Perot. Clinton had his own CIA ties, as did Hillary, but I won’t bore you with the details, here — but when I was saying the same publicly, I got hate email laced with expletives directly from the Oval Office. I was at the time researching my four-volume bookset, Fatal Rebirth, documenting crimes of the New World Order from 1947 forward.

As result of my investigation, it became clear to me that H. Ross Perot was a dangerous threat to the two-party system of power control via Dog and Pony Shows of pretended and superfluous political differences. Given Perot’s growing popularity, I feared they would take him out. He was last Century’s ‘Ron Paul,’ without the benefit of a congressional title.

I warned the Secret Service, who did nothing but put ME under surveillance for five years. Meanwhile, Anthrax was mailed to Perot’s family (the same thing used to silence one of Bill Clinton’s State Police-assigned body guards when he was Governor of Arkansas, to silence him from testifying about Clinton’s ties to CIA drug running in Iran-Contra, a George Bush sanctioned operation.) The Perot attack was confirmed to me by my own back-channel Secret Service Agent contact. It forced him to quit the race the night of the Colorado Primary, which he won even after quitting. Had he not quit, it would have given him enough electoral votes to have a place on the main Nov. election ballot.

But the NWO does not want you to have true freedom of choice. So you only get to vote for the two candidates they offer you, both of whom they own outright. If you knew the full story of how Ron Paul was prevented from being on the ballot, you would understand. Even with two candidates, the election is rigged so that it does not matter much how you vote, though wild-card antics like Chad counting can upset the equation without angering Eurobosses. Here’s how, and why it relates:

In those days, I had already interviewed a man claiming a flight crewman of CIA’s Evergreen Airline had confessed details of a secret flight: Bill Clinton, George Bush, and others (not Perot) were flown to Europe to meet with Bilderbergers to decide who would be our next President, Clinton being the answer. The plane landed and taxied to the end of the runway, where other Bilderberger planes already sat waiting.

Everyone got onto the same plane for their meet after deciding who would be the new President, and then departed in reverse manner, never officially entering the country. While we cannot confirm if this is a true event, it would give Bush a motive for circumventing by directly usurping power through martial law to end the election process. But to declare it would require some kind of internal upheaval on a national scale. Could such be engineered, and yet not seem manufactured to anyone, especially the Bilderbergers?

Are the Rodney King and Dorner matters linked to a Martial Law plot?

Playing the rest of the black cards

The race card trick: beating King and getting video taped was the first step. King was the perfect choice: he not only had the same last name as Martin Luther, but when clean shaven, he looked much like the much missed, martyred man. Beat King with video documentation, and you get instant renewed martyrdom, and kindle angst anew nation-wide in the black and white populace alike. But good quality video at night in those days was not as easy as it is, today.

The high-tech (for the day) Sony camera used had just been purchased and was taken right out of the box for the first time that night in response to the beating, it was claimed. I say claimed, because right out of the box, the battery would have been useless. The person filming was a Canadian-born contractor who had been raised in Argentina. You know, that country where the Nazi’s went after WWII, and where George Bush has bought huge tracts of land, and a fun place known to be a CIA playground in South America.

The second was to make sure the verdict in the trial was ‘not guilty.’  That was arranged by: a) having the first judge removed from the case as ‘biased,’ and b) the new judge assigned changing the venue to an all-White, well-to-do community resulting in a jury of 10 Whites and one Hispanic. But how do you make sure the violence level upon such verdict is sufficient enough to warrant calling in the National Guard? Simple — step c) have the National Guard foment violence to prime the pump. False flag stuff. Military stuff. CIA stuff. Any sign of that in LA at the time?

Well, as Dorner himself also mentions, we had for Chief of Police in LA at the time one Daryl F. Gates, clearly a New World Order Police State mentality kind of guy. He virtually invented SWAT teams and Police intelligence operations involved in wholesale spying on civilians. He also pioneered ‘sweeps’ of up to 1,000 officers at a time to arrest and detain everyone of a given class (e.g., 25,000 black and Hispanic youths, known or suspected gang members) simply for the harassment value, and to keep them off the streets for the convenience of city public relations, such as employed during the 1984 Olympic games.

The spying operation did favors directly for CIA fronts, while other police operations, including drug enforcement programs ‘invented’ by Gates (CRASH) made themselves useful to sanctioned CIA drug running in LA County. Ask ex LAPD Officer Michael Ruppert, who has been trying to blow the whistle on CIA drug operations in America ever since he was approached by CIA for the purpose of recruitment while on the Force. Ruppert thinks Gates was a CIA Case Officer, a CIA in place asset.

We should mention Gate’s role in the CIA mind-control assassination plot against RFK, where Gates ordered key evidence destroyed because ‘it was taking up too much room, and an ex-CIA Cop in the Command Center under Gates, ordered Cops not to go after the Man and his associate, the Woman in the polka dot dress seen earlier with Sirhan, and later seen running away gleefully saying “We did it! We shot Kennedy!” At the time, he said, “We don’t want them to get anything started on a big conspiracy.”

So then, was there any false flag ‘stuff’ of the sort going on in the LA Riots? In Fatal Rebirth, I detail some little known facts which national media censored, but which was revealed in local news reports. Things like someone parking an unlocked railroad box car full of guns on a siding near the LA Watts black community, and even helicopters dropping guns like they were beaded necklaces at Mardi Gras; like staging a violent attack on whites by blacks and videotaping it for news use… the participants other than victims later identified as National Guard in civies; like four black men caught by Police driving around town with a car full of guns and Molotov Cocktails, later released to a National Guard Major who claimed they were his Men. Here is a bit of a taste; guns appearing out of nowhere, a first-hand account.

Is Dorner intended to spark race riots to allow Martial Law?

To triumph, play the trump Ace

So one question which arises is, was Dorner to become the ‘Ace of Spades’ (the basis of my artwork) in some delayed completion of the Martial Law scenario by the military? Is some future revelation planned which will show him to have been framed and then murdered by LAPD, a tactic seeking to rekindle the 1992 hatreds all over again?

Keep in mind that in preceding months, there have been, and continue to be, a rash of massive live-fire (blanks) military Special Ops raid training exercises conducted in downtown Houston, LA, Minneapolis, Boston, Miami, and elsewhere (YouTube is rife with videos). Not once did city officials get advance warning, causing panicked civilians, some of whom took up arms just in case they would need defend themselves from (someone).

And, also in the weeks prior, the US Army leveled the 43 Acre Sepluveda Basin Wild Life Preserve (home to 250 species of birds) belonging to Los Angeles City WITHOUT NOTIFYING ANYONE. And as I write this, reports continue to come in of whole trains, as well as convoys of trucks carrying military vehicles along I-40 to Los Angeles. Someone is getting ready for something centered around LA.

But in truth, I rank its being tied to Dorner as being lower in likelihood than Chinese invasion or other, more useful martial law scenarios such as pandemics, nuclear or bioterrorism, etc. It might even be easier to stage an alien invasion, given that DARPA has developed huge stealth (radar absorbing, visually hard to see, soundless) UFO-like craft which have been test flown and sparked UFO flaps, already. So why go to the trouble of trying again something which didn’t work well in 1992?

A little more likely: something redacted from Dorner’s list of LAPD sins

If we presume that the Dorner’s material was altered, it is reasonable to presume something was removed. Something so dangerous if made public, that it was worth killing for, and framing Dorner to silence him. Imagine for a moment, that the people ‘killed by Dorner’ were people who also knew too much or who were considered weak links in a conspiracy. Or, some of them, perhaps even all, may have simply been targets of convenience because they were mentioned in Dorner’s complaints against LAPD.

Monica Quan was the daughter of LAPD Capt. Randal Quan, ret., who represented Dorner unsuccessfully (and poorly, according to the Manifesto) in hearings which resulted in Dorner’s termination from LAPD. Both Monica and her fiancé, were found shot dead in their car parked at their shared condo address. What if someone feared that Randal Quan might have shared some secret with her? Might that have resulted in targeting her, and the boyfriend in case she had in turn shared it with him?

Within minutes of the shooting by some accounts, the ‘manifesto’ was posted on Facebook, though not discovered for many hours. Open and shut case, right? But think about it. If you were going to launch a killing spree against cops… how much advance notice and tactical warning would you give them? Dorner’s alleged post included excruciating details of the threat and methods he would employ. And then, there was silence for four days, giving Police ample time to put investigative resources in motion, and putting Dorner at risk of capture. How logical was that, tactically, if how it really went down? It makes no sense.

On the fourth day, a gun battle ensued when two LAPD claim they spotted Dorner near the home of someone named in the post as likely target. One of the two Cops was grazed, but their suspect escaped. But how likely is it that it really was Dorner, given that a total of seven people known not to be Dorner were shot at by spooked Cops thinking them to be? We are talking about Cops opening fire without warning and shooting people clearly not Dorner — in the back in some cases. Dorner is a huge black man. So why shoot two Hispanic women, a slightly built white male, and a young surfer dude? Clearly, they had no real clue what Dorner looked like, then. So I must ask, did they really know it was him in that first gun battle?

Then, that same day, a SWAT Team Officer, Michael Crain, also a bad Cop according to Dorner, was shot dead, and a trainee with him critically wounded while they waited at a stoplight — attacked by someone who ran up to the car on foot. A bit curious to me that everyone killed by ‘Dorner’ died in the front seat of their car… which means someone was waiting for them at exactly the right place and time for a quick hit and run operation.

That requires exceedingly good intelligence and access to very detailed and current internal Police information in the case of Crain. I don’t believe Dorner, an ex Cop, would have that level of needed information available. Do you? It may be helpful to know that one of the favorite assassination points for CIA hits is while the target is in transit by car. Funny thing is, though, it takes CIA-style tricks to insure that a target will stop at the one stop light you deem most useful for the hit. That means more than one person is involved. Are we to believe Dorner pulled the feat off single-handedly, or would an internal conspiracy be more probable?

And who is Crain? An ex-Marine. Dorner is ex Navy, thanks to his problems with LAPD. But while he was still a Cop and in the Naval Reserves, both would likely have been ‘in the loop’ with respect to any illegal or paralegal joint military-police drills of the type mentioned above. And, therefore, we may presume both might have known something about an illegal future operation, or some dark matter associated with one already conducted. So how far fetched would it be for one to be killed to silence them and the other to be blamed for it, and to modify Dorner’s texts for the purpose?

It’s almost guaranteed to work, especially if the first killing is scheduled at a time when Dorner would have no alibi he could prove, such as being home, alone. Imagine being Dorner: you hear on the radio of the Quan shooting, and realize… ‘My FB page mentions the elder Quan in a bad light. That may make me a suspect. I’d better review my wording.’ So you try to do just that and discover you are locked out of your own account, and you recall your Credit Union account was hacked by an LAPD Officer once, already. So you just go to the page and find your list of complaints has suddenly become a confession (manifesto). You have no choice but to run, knowing Cops kill Cop killers almost always, no questions asked.

Especially run when you hear news reports that: a) some of your personal Police equipment was been found in a trash bin near the murder scene; and b) someone claiming to be you called Randall Quan to mentally torture him over Monica’s murder. And, thereby, unfolds the story we have been fed in media. But as we’ve seen, there has to be more at work here than that.

If the Dorner manifesto is a fraud, what can be believe about the official story?

Next up: 12 Frightening New Questions Illuminate the Dorner Urban Legend

Will America survive Chris Dorner?

 

Dorners ‘Manifesto’: Manufacturing a D.B. Cooper-ish Urban Legend?


What would it mean if the Dorner ‘Manifesto’ was not written by him? What if he were deliberately being made into an urban legend to cover up crimes by the real authors, including Dorner’s murder before the Cabin assault even took place?

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice.

What you will learn reading this post:

• There are many clues which make it doubtful that Dorner is the sole author, such as…
• there are three distinctly different writing styles, typically standing out as if additions after the fact inconsistent with and reversing the intent of material clearly Dorner’s;
• there are past tense and third-person references to Dorner as if already dead, and implied future tense when relating to the murders Dorner allegedly committed;
• there are clever tricks designed to paint Dorner ‘mad’ which not even a crazy person would be fool enough to write.

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

wallet found

They claim they found Dorner’s wallet and readable ID here? Sure. But that’s OK, because they also found it at the Mexican border. Sure. At least that’s what they told media to tell us when it was expedient. Image: redicecreations.com (click) – about two wallets.

I must say that when I first heard reports about the Dorner incident, each update simply seemed more and more… unbelievable. Increasingly, the possibility grew in my mind that it was a set up. I mean, you have a good, moral cop fighting a just cause against corrupt, brutal, and racist cops harming citizens, and then he’s suddenly a crazed killer destroying the very foundation of his case by brutally murdering a minority citizen… not to mention cops? And everyone signs off. Please.

That’s just as believable as conveniently finding known terrorist’s wallets with their real identities, not alias’ commonly used as a cover, among the ashes in attacks where the largest thing otherwise remaining was a mote of ash. They’ve pulled that one on us three times that I know of, including Sept. 11 attacks. No false flag here… move along, move along.

But wait! They’ve found Dormer’s wallet repleat with readable plastic ID, where? The ashes of the burned-to-the-foundation cabin? AND, they found them at the Mexican border just hours earlier? No conspiracy here… move along, move along.

The only way I could justify the actions claimed of Dorner in my mind was if it were yet another ‘mass shooting’ event sparked by psychotropic SSRI drugs of the likes of Prozac, Paxil, Zoloft, and others. These killer-makers all have murder and other violence as unpredictable side effects, and have been found to be in use by virtually all mass shooters. Ban guns? No thank you, but please, ban SSRIs and zany brain Witch Doctors who keep inventing new reasons to prescribe them like candy. Check out the facts and how SSRIs have bearing on the matter.

Sure. If Dorner was suffering depression, stress, and daily anxiety that he might be shot dead by dirty cops for ‘crossing the Blue Line,’ he might have been prescribed SSRIs for cause. But I doubt it. Because consistently co-present with the violent side effects is a lack of reason, logic, motive, or even an understanding of why they undertook violent acts, or even clear recall of them. Dorner, in his ‘manifesto,’ not only remembers, but screams a reason, motive, and understanding — flawed thinking though it be. But then, there are problems with the validity of that document…  I don’t think he is the sole author.

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

A manifesto which is not a Manifesto

Trotted out was the alleged Manifesto, which is in this case is really nothing more than a dumb-you-down term used much the same way the Davidian ranch at Waco and Randy Weaver’s log cabin were variously called an ‘enclave,’ a ‘fortress,’ or a ‘compound,’ all implying military defensive planning in their design. Propaganda BS. Reading Dorner’s work (uncensored version), you find there is no Manifesto present, at all.

No. Instead, it seems like five distinctly different texts in three differing styles as if by three different persons, and for four different purposes, not counting some political sandbagging and blindsiding thrown in for good measure. If you take away the things which seem added, all you have remaining is a plea for LAPD to do the right thing about a laundry list of wrongdoing.

1)   The main body, which accounts for the bulk of the 18 page document is a detailed review of crimes and abuse of power of LAPD Officers, leadership, and events relating to Dorner’s whistleblowing and the resulting harassment and cover up — an event log. There is reason, calm, logic, and moral dignity present, and cohesive writing style. Clearly, it is the Dorner who fits the profile of a good cop and who is in control of himself. No Manifesto, it is merely a point-by-point, blow-by-blow accounting of his experiences trying to be that good Cop.

2)   The introduction paragraph, on the other hand, is something else: a ‘confession’ of the murders and what sounds like an attempt to ‘excuse’ them by virtue of righteous indignation forcing acts of extreme violence as a “Last Resort,” which is indeed the title line. But were these things added later by someone else?

Particularly problematic is the writing style of this large paragraph. It is like the 9-11 cell phone calls from hijacked planes where callers spoke in ways no one ever does, revealing the calls were staged: “Hi, this is Mark Phillips, your son.”  Would not a Mom know her own son, and their family’s last name? Interesting, especially since cell phones in those days did not work at altitude.

In the ‘manifesto,’ we read what seems like someone else trying to make you think them Dorner. Why would you write about yourself the way others describe you when you are not around, and generally only at your funeral service or on a death bed — in past tense?

Example a): “…completely out of character for the man you KNEW who always wore a smile wherever he WAS seen.”

Even if one actually believed that’s how people saw them, would they not more likely in such a case say; “… out of character for someone who always tries to wear a smile…” or “known for always wearing a smile…”?

Example b):I know most of you who personally know me are in disbelief to hear from media reports that I am SUSPECTED of committing such horrendous murders…”

Why not simply say “…disbelief that I murdered anyone…”? And why even bring up media at all, especially via the expression, ‘media reports’? If I were going to say it at all, I’d simply say ‘on the news,’ but it is entirely superfluous given its assumed they had to know by one means or another… unless one is writing in knowledge that there WILL BE breaking news, and that writer is used to describing news as ‘media reports.’ That is exactly the way Cops and others who must at times cite news sources, including myself, would be used to saying it. Its use implies a different writer, one with foreknowledge of future events. Sure, Dorner is also a Cop, so he might write it that way, too, except that…

In like manner, the choice of the word ‘suspected.’ If you know you did it and are taking credit there on the spot, why use that word at all.

If written instead by another Cop framing Dorner, that Cop would be so used to referring to third-parties as suspects, and expressing ‘facts’ in certain ways, that it could have easily crept into typed text without notice. Someone writing about their own actions is not so moved. These are not the only instances, and more to the point, they only exist in select parts of the text, nowhere in what appears to be the main body (next three items) clearly written by Dorner.

3)   In the middle of the main body, the accusations against LAPD, we find a curious out-of-place section, a very large paragraph, of zero relevance asking journalists to review his school years (he lists towns he lived in) to show he was never a bully or got into fights.  And yet, the same paragraph describes an incident with him throwing the first and only punch and getting punished, and about continually earning more such punishments thereafter. Excuse me? It is as if someone wanted journalists to deduce the opposite of what the paragraph claims to want, and deem him not only violent minded, but mentally incompetent and unable to distinguish between the two states of being. It had to have been ADDED to get there in the middle, given a lack of context to prior or following material.

4)   The passage is one of only two sections, which use profanity. It is also the one place where he derides Christianity and claims not to be a Christian, though elsewhere he presents his morals in very Christian terms. Now, I’ve read many documents similar in nature where the author was non Christian, and they made negative comments at every opportunity, not at just one point.. So I must ask:

Could this section have been inserted, and ‘addressed’ to journalists because, a few paragraphs later, Dorner also asks in the main body that journalists review a particular set of events and specific records which validate his LAPD accusations? By sounding completely bonkers and self contradictory in the first request, the second request would likely be ignored as well. This is essentially the whole de facto effect (and purpose?) of the entire ‘manifesto.’ It screams ‘ignore anything I say or complain about, because I do the opposite of what I say and am worse than those I complain about.’

Funny thing is… the nature of sociopathic and psychopathic behavior specifically includes the ability to well hide it, rather than to reveal it unknowingly — which requires them to be immune from doxastic self deception (i.e., saying you do not get into fights, then citing fights, and not sensing the paradox). Someone deliberately created that paradoxical paragraph.

5)   From that point forward, it seems as if almost every paragraph of the remaining main body text has at least one sentence, or even a whole paragraph (added?) which tends to convert it from a rational, non threatening letter into a reprehensible, irrational threat. You literally feel the tone change between what came before, and the additions. I get the distinct impression someone started by adding the final section (described next) at the bottom of the document, and then worked their way up paragraph by paragraph, editing for an I-am-a-mad-man-so-kill-me-quick effect, and stopped with the middle insert we just reviewed. Save original passages, most are tacked onto the end, because that’s the easiest thing to do, and they are often very simple, short one liners — but an original writer would tend to include such key elements throughout the dialog and thoughtfully so.

Example a) I have exhausted all available means at obtaining my name back. I have attempted all legal court efforts within appeals at the Superior Courts and California Appellate courts. This is my last resort. The LAPD has suppressed the truth and it has now lead to deadly consequences. The LAPD’s actions have cost me my law enforcement career that began on 2/7/05 and ended on 1/2/09. They cost me my Naval career which started on 4/02 and ends on 2/13. I had a TS/SCI clearance(Top Secret Sensitive Compartmentalized Information clearance) up until shortly after my termination with LAPD. This is the highest clearance a service member can attain other than a Yankee White TS/SCI which is only granted for those working with and around the President/Vice President of the United States. I lost my position as a Commanding Officer of a Naval Security Forces reserve unit at NAS Fallon because of the LAPD. I’ve lost a relationship with my mother and sister because of the LAPD. I’ve lost a relationship with close friends because of the LAPD. In essence, I’ve lost everything because the LAPD took my name and new I was INNOCENT!!! Capt Phil Tingirides, Justin Eisenberg, Martella, Randy Quan, and Sgt. Anderson all new I was innocent but decided to terminate me so they could continue Ofcr. Teresa Evans career. I know about the meeting between all of you where Evans attorney, Rico, confessed that she kicked Christopher Gettler (excessive force). Your day has come.

Example b) Chief Beck, this is when you need to have that come to Jesus talk with Sgt. Teresa Evans and everyone else who was involved in the conspiracy to have me terminated for doing the right thing. you also need to speak with her attorney, Rico, and his conversation with the BOR members and her confession of guilt in kicking Mr. Gettler. I’ll be waiting for a PUBLIC response at a press conference. When the truth comes out, the killing stops.

Example c): Those Hispanic officers who victimize their own ethnicity because they are new immigrants to this country and are unaware of their civil rights. You call them wetbacks to their face and demean them in front of fellow officers of different ethnicities so that you will receive some sort of acceptance from your colleagues. I’m not impressed. Most likely, your parents or grandparents were immigrants at one time, but you have forgotten that. You are a high value target.

6)   The next, closing section is a long list of ranting which, along with a concentration of profanity, is a bit of a grab bag. It is unusual in that it has countless little paragraphs aimed at a wide variety of public figures in a bouncy mixture of complaints and praise which render the writer a loon. Also in the section is a kind of long train wreck of a letter to LAPD, with dire warnings of impending violence towards other cops and their families. Much of the letter portion, if one again discounted sentences and portions which might have been added to flip meaning, may indeed have been written by a sane Dorner, a genuine plea to do the right thing, with additions again subverting them into threats. That is not how threatening people write. The nastiness is pervasive, not tacked on neatly. Sans such additions, it is no longer a train wreck, nor rambling.

7)   These added things tend to be in the same style otherwise questioned in the opening examples, but with more Angst and vileness.

Example (not a typo by me) regarding killing cops; It was against everything I’ve ever was.

Wait a minute. There is a difference between me writing about me; “It was against everything I’ve ever been,” or about someone else; “It was against everything he ever was.” Those are the only two possible original sentences. Either there was a super-nova brain fart, or a partial correction was made to the later sentence. Let me explain.

Imagine someone other the Dorner subliminally mixing thought states from first to third person as well as from relating life experience of the living to past experiences before one’s death. So ingrained as natural to repetitive writing about third parties (in Police reports?), perhaps, that only a partial editing correction (‘he’ to ‘I’ve) was made, the writer still not catching the tell-tale ‘was.’ Either or both reasons for the error make it someone other than Dorner doing the writing, and further implies Dorner already dead, or sure knowledge he was to be, soon.

8)   Nothing in the document would convince you Dorner was crazy as much as does the letter component. When I say rambling, I mean a completely different visible style of sentence structure (or lack thereof), with gross errors not common to the main body. Among them, are incomplete or nonsense sentences, such as the very last one, “We need to hold ou” What? The Cops were at the door and he had to stop mid-sentence and fetch some beers? And yet, again, these sentences/passages are mixed in as if additions to existent, logical, well written material. Take them away, and it suddenly seems normal.

9)   And what about depression? He ‘admits’ suffering from it in the letter part. Funny thing about that is, it always seems officials in questionable deaths of the politically incorrect find a way to say ‘We had indications he was depressed…’ when they ‘suicide.’ Perhaps, but that still only accounts for the murders if he was on psychotropics, for which nothing else matches the symptoms, and still leaves the document flawed in its present construct.

10)  But also in the section is a very long rambling bit which seems to be there only to serve gun grabber needs, and given that Dorner is (allegedly) now one of the ‘mass shooters’ of late, we can expect it to be one more log on the fire in that debate. How convenient.

But, uh… what should we expect, given that the section also praises the likes of both Clintons and Sr. Bush, as well as CIA’s (or Mossad’s) journalists of choice (links reveal), Walter Cronkite (Who wrote this? WC retired when Dorner was three years old!), Peter + Jennings, Anderson Cooper, and Wolf Blitzer, et. al? A Globalist’s Cop who likes a controlled media — who owns all manner of firearms, which he lists, and yet wishes were banned, and which are on Feinstein’s list, too? Please. No propaganda here, move along…

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

Conclusion

Given the dichotomy and logic and style flipping content overall, one might choose to toss off the concerns I’ve stated and to instead presume it at simple face value as the work of a lunatic. Heaven knows media is accepting it, so why shouldn’t we? We will actually answer that question, in another blog in this series.

For me, because there is no hint of a specific or consistent lunacy… because nothing in the document as it sits should make any sense even to a deluded writer… because of the clues of alternate author additions cited… we might do well to question authenticity. If NOT authentic, then there is a conspiracy, and nothing we’ve heard about any event related to the matter can be trusted to be true. So, presuming there is a motive to decieve, is there anything suggesting means and opportunity, for someone to make such changes to Dorner’s words? Lets ask a couple of key questions which address that:

1)   Where did the ‘manifesto’ come from?  Answer, from a Facebook page the LA Times describes as “believed to be Dorner’s.” Huh? Three problems with that:

a) wishy-washy ‘believed to be,’ makes me wonder all the more about authenticity. I have doubts, because…

b) anyone can get a Facebook account in any name they want not already taken, and…

c) anyone who has ever had a FB account should know how easy they are to be hijacked, hacked, or accessed and manipulated by unauthorized users via password cracking. Ergo, next question…

2)   How secure were Dorner’s computers and access to his Web accounts? Answer, from his own documentation of LAPD targeting for being a whistleblower; Thaniya Sungruenyos, an LAPD Officer had hacked his Los Angeles Police Federal Credit Union account from her home address, per the IP address provided by the Financial institution. LAPD ignored the evidence and covered up the event, according to Dorner.

Interesting what you can learn, when you question the official line and look more closely. Seen anyone in media following suit? No? Well, that leaves just you and me conspiracy theorists, I guess. But then, there are other people who wonder, too. Check out the last two related articles about Dorner, one of them a Police Chief.

What is the truth about Chris Dorner?

Next up: Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto

Is Dorner really dead?

Confirmed: Interview on Mass Shootings: Absolute Patterns Prove NWO Conspiracy


Join me on an interview on Urban Warzone in a new timeslot: Thursday, the 31st of January at 1:PM EST to be startled with answers to troubling questions about the images herein.

Note: Cyrus has confirmed the new time slot IS indeed 1PM EST. He has simply not been able to yet update his 
 
Update Jan 29: Reconfirmed and posted actual time/date. Announcing that a special image will be added to this page while on air, and removed afterwards. That image will be used to explain how the remaining graphics herein were arrived at, as well as highlight the differences between relationships between parties in the ‘official’ media/government version of a mass shooting (Aurora) and the result of private investigations in multiple states by myself and assisting field investigators. You can’t imagine how revealing it is until you see it for yourself. But its complexity goes beyond the ability to well explain in the blog and thus it will be subsequently removed. Your ONLY chance to see it is to join us LIVE, though you will be able to listen to the verbal dialog later once Cyrus posts it – sans image.

That’s the day after this post: we will explain how the following graphics came to be and how they prove that mass shootings are part of a long-term plan to establish the NWO. Tune in and participate live, and have this blog post open.

Reading this post you will learn…

• That virtually all mass shootings are not random events, but part of an elaborate plan with multiple patterns only possible by intelligent design;
• That these patterns manifest in many ways, including the ability to generate complex graphical images of mystical and satanic symbols on maps;
• That individual key shootings (i.e., Aurora, Sandy Hook), have additional patterns of their own, all playing to a larger North American pattern of like construct;
• That patterns can be so accurate as to predict likely future shooting events.
 

This matter is too complex for a mere blog. Therefore, I will be going on air to explain more usefully, referring to the images in this blog for purposes of illustration of key points. Please review the images below and read the questions posed for each, questions which I will attempt to answer on air. Then join in the discovery, live, at Urban Warzone.

I will also be preparing a PowerPoint which I want to make into a video. Listen to the show to learn how you can not only get a free copy when it is finished, but also, a free copy of my book, Fatal Rebirth, which predicted this eventuality in the first place more than ten years ago. It also happened to predict Sept. 11 attacks, and much more.

As you review, keep in mind that random events do NOT form geometric patterns. Official Pattern Dispersal Studies by the militaries of many governments around the World investigating UFO sightings have proven that. Not one single instance reported of finding even three points in a perfectly straight line, much less forming right angles or shapes. Yet in analysis of mass shootings hundreds of miles apart, it is possible to find many in a line (and many lines form very complex 3-D shapes), and in some cases (where information details allow), accuracy to within 25 feet, and with doorway-t0-doorway accuracy.

The first question is (but among the last, perhaps, to be answered), why is it that all such plots ONLY work with such accuracy when doorways or driveway entrances are used in the plots? That alone implies intelligent design, does it not? Read on…

Quadrants

IMAGE ONE: The NWO movement is sponsored from Europe via Masonic Mysticism and Satanism

How is it possible that these ‘quadrant’ lines were discovered by patterns associated with just five shooting events, and yet, confirmed by many dozens more such events? How do they relate to the Illuminati NWO movement, and what additional discoveries can they reveal?

Compass Rose

Image Two: The Compass Rose (also CIA’s Logo) is an important Masonic emblem. There are seven, here

How is it possible that investigation of facts surrounding the Aurora Shooting led to an ability to locate and plot this graphic? How does it relate to Masonic Mysticism and why is it not pointing North? How is it that six more real-world roses in the Denver Area have intricate relationships to the shooting, as well (blue, purple, red, yellow lines)?

Masonic Emblems, Maltese Cross

Image Three: Some more traditional Masonic symbols created from data points associated with the Aurora shooting

How are these (and other) Masonic symbols revealed by information drawn from the Aurora shooting? How can random events possibly generate such patterns unless by intelligent design? What process was used to discover them? Who is behind it?

All Seeing Eyes in Denver

Image Four: Perhaps the most meaningful of Masonic Emblems, these point toward a future terror event well beyond 911 scale

How does it happen that two large real-world structures would be discovered to relate to these famous Masonic emblems and point to a future terror attack? How are they interlocked, and how might their intentional existence and relationships verified in other ways? How does it relate to and predict terrorism? How is the terror event tied to mass shootings?

Baphomet in Denver

Image Five: Baphomet (one name of the symbol, and one name for Satan); an upside-down 5-pointed star

What is the significance of being able to plot this symbol from shooting data points? Why is it not perfectly upside down (normally to be aligned to North in ceremonies)? What are the significances of its structural elements in black magic?

Masonic Emblem and Baphomet in Sandy Hook

Image Six: Sandy Hook is no different than Aurora with respect to finding symbols, and yet, it is quite different

WHow is it possible to get symbolism out of Sandy Hook when there were far fewer data points (actually, answer is found in the next set of images, and by the text labels in this image)? Why is the Pentagram tipped the other way?

Sandy Hook in Gotham City Map

Scan of actual Gotham City Map used as PR piece for the movie; Sandy Hook at bottom

Gotham City and real Sandy Hook Compared

Image Eight: The Dark Knight Rises Gotham City Map compared to real map of Sandy Hook has many shape alignments

Gotham City and real Sandy Hook compared

Image Nine: Even more details have relationships to things found in the real world at Sandy Hook

Gotham City real world Sandy Hook compared

Image Ten: And even more details upon close inspection

Why are there so many curious matches between the movie showing a fictitious Sandy Hook when James Holmes opened fire and the real-world Sandy Hook? Why bother to have such elaborate symbolism in a conspiracy in the first place — why not just worry about event planning, alone?

Note: the name matches in blue and red texts do NOT represent any reason to presume any conspiratorial relationship between persons or businesses, but merely represent someone using them as landmarks for their ‘secret’ machinations. Also, the three features at the school are not ‘front’ and ‘rear,’ but at the sides. The Shed happens to belong to the Masonic Lodge. The small dot at the school is not actually ‘in the real world’ as such: it is a cement pad in the shadow of a tree which, in Google Earth, provided the visual of a round black shape presumed to exist (we must assume) by the planners. Or, it relates to something intended in the shooting plan for which we yet have any details, or which failed to take place as planned (e.g., where Lanza was supposed to die).
 
Masonic Emblem at Sandy Hook

Image Eleven: Masonic Emblem ‘mowed’ into the field abutting Gene Rosen’s Property

Why does Gene Rosen have a Masonic Emblem hidden amongst ‘random’ mowing patterns in what is effectively his back yard (though ownership has not been established)? Why does his story change so many times? Why would a bunch of kids and (one version) a bus driver go PAST the Fire House to get to his house when CLEARLY, there would have been BETTER SAFE HAVEN and some hope of getting help found at the Fire House?

Mass Shootings reveal North American Baphomet

Plotting all national mass shootings allowed finding this emblem covering North America.

How did plotting the location of all ‘random’ mass shootings enable discovery and plotting of this Baphomet? Why is it slightly imperfect?

Note: The distances involved do impact accuracy because of idiosyncrasies in Google Earth plotting tools. The smaller the distances, the more accurate you can be (to a point); Sandy Hook was accurate to within 20 feet or so, Aurora (much larger scale) to within 50 feet or so. Despite the vastly larger scale, here, accuracy is less than Google Earth would allow, with several tens of miles in error where perhaps hundreds of feet should be the maximum error. There is a very interesting probable reason. 
 

Statistics Prove Gun Control No Solution; a Political Ruse


Statistics prove gun control is no solution; gun violence is a political ruse.

Taking away guns does not stop psychiatric care-sponsored killings: pseudo science and drug industry profits are the real killer

by H. Michael Sweeney, copyright © 2012, all rights reserved. Permissions to duplicate in full with all links and credits in tact hereby granted, provided they point to proparanoid.wordpress.com and include this notice.
Was Sandy Hook Shooting a multiple shooter conspiracy?
Updated 4/10/13: Proof media and government don’t want you to know the truth and employ disinfo tactics instead, re ‘gun control.’ Changes and pointers to related material indicated with RED TEXT.

Reading this post you will learn

1)   Statistics show the worst shooters are victims of mind altering drugs given under ‘psychiatric care’ with poor or no supervision;
2)   They also show that when denied access to guns, people find more gruesome means to kill, even in mass murder;
3)   That such drugs have a history tied to CIA mind control research in a class I call mind control enabling psychotropics;
5)   That the ONLY winner in gun control is tyranny.
Who is lying about the guns used in Sandy Hook, and why?
Official portrait of George H. W. Bush, former...

Official portrait of George H. W. Bush, former President of the United States of America. (Photo credit: Wikipedia)

Portrait of DoD Mr. J. Danforth Quayle, Vice P...

USAF portrait of Vice President J. Danforth Quayle (Wikipedia photo)

Update: The mass murder attempt in Texas yesterday employing a knife and response by media proves a couple of key points regarding the validity and reasons behind gun control efforts. Additionally, Mr. Sorento, Presidential pretender, is blindsiding Congress and the public when he gives speeches on gun control.

1) There are a rash of ‘copy me’ mainstream news articles using the same exact text/images/headline claiming that mass knife attacks are RARE according to experts. Other media have at least reworded the same message, but remain parroting an official line. This is blatantly false as the statistics show, below, marked now in Red. This blog has cited more than 20 examples of mass murders or attempts using weapons other than guns, specifically to point out that taking away guns does not stop murderers.

2) Other articles and news sources (TV/Radio) are trying to spin the knife attacks in support of gun control by offhand remarks such as ‘If he had used a gun, there would have been more deaths.” Perhaps so, but who is to say his intent was to actually kill — else he would have chosen a weapon with a longer blade. More to the point, if students had been allowed to conceal carry, HE would have been dead with reduced bloodshed of innocents.

3) Sorento gives his speeches before a 100% manufactured crowd of supporters with absolutely no opposing viewpoints allowed, This gives the illusion that NO ONE in their right mind could possibly disagree. This is result of his illegal quashing of 1st Amendment Rights by signing the so-called Federal Buildings and Grounds Restrictive Act. This Law allows Police to eject, even arrest anyone who protests on government property or anywhere near events where government officials are appearing publicly. This is nothing less than subtle disinfo blind siding. End update.

Arguing to take away guns ‘that have no use to a hunter’ is to ignore the fact that the 2nd Amendment has nothing to do with hunting, and everything to do with insuring government does not abuse their power over the people. It is intended to be a form of checks and balances to tyranny, and nothing less.

We clearly need it now more than ever, given the rapid loss of freedoms to government’s paranoiac response to ‘terrorism,’ a crime of questionable attribute, at best, and one which kills fewer Americans than results from wrongful deaths at the hands of law enforcement.

My idea of gun legislation, therefore, is to give me the right to pack a government provided SAM missile launcher and Apache helicopter, not merely some bolt-action rifle I pay for at my own expense — in part because pistols and single shot rifles do little to deter soldiers able to pick you off from a distance with their sniper rifles… and DHS is spending billions to stockpile enough ammunition to kill everyone in North America, including some 9 million rounds of sniper bullets. I have to ask why, and fear the answer is the T-word.

Why does the government want to take your guns away? Martial Law is why.

Lets be clear

No one wants to take away from the legitimate concerns of victims of senseless murders of innocents as underscored so horribly in the recent rash of mass shootings. It is right to be angry and to grieve with introspective analysis and to seek a solution to prevent such heinous acts as so painfully evident in the massacre of children and adults in Connecticut. And all Americans and people elsewhere in the World are victims, too… we all are forced to suffer some lesser anguish in our compassion for those who lost family members and friends in these events.

But please, do not become yet another kind of victim by taking the bait and blaming guns, not even a particular kind of gun, especially when inconsistencies and the very nature of official statements of evidence suggest either a conspiracy of shooters is being foisted upon us as yet another ‘crazed lone gunman,’ or lies are offered in a conspiracy within government to force gun control upon us… or both.

How, for instance, in Sandy Hook, is it possible for the Coroner to cite to media with law enforcement at his side that everyone was killed by a rifle, when State and local Police had already stated that only handguns were found in the school with the shooter’s body (first, two, then four pistols), and the only rifle found was in the shooter’s locked trunk?

There are other questions, but not as many as found in Aurora’s theater shooting. These kind of nagging ‘conspiracy theory’ questions for which the public deserves to have answers are always ignored, of course, because, ‘they are merely conspiracy theorists’ doing the asking… even when persons of credentials ask. Thus the truth, including the real cause of ‘gun violence,’ is never explained.

Why are there so many ties between Sandy Hook and Aurora?

Right in front of our eyes all along

And yet, the real cause has been right before your eyes the whole time, but deliberately veiled by corporate and government forces allied for varied agenda. I first wrote about the problem in my book, Fatal Rebirth (a four volume look at crimes of the New World Order which predicted Sept. 11 attacks, an assassination attempt which took place, and mass shootings of the kind we face, now, and so much more). I also wrote about it in my books on Political Control Technology, such as MC Realities.

A ten-year research effort for these books, as well as personal family experiences, made it all-too-clear.  It is subsequently verified by statistics and other information you can easily verify for yourself: the real culprit is a thirst for power and control, both financial and political. Their weapon is disinformation, and chemicals. As such, then, it is imperative that we look both at mass shooting events as well as political assassination events; both being used to effect political change against the natural will of the people and course of governments. It is, after all, yet another form of mind control for the masses: change the mood and the will of the people with lies.

Are mass shootings sponsored by the CIA or military?

Start with the Congressional Record

If you are closed-minded about the possibility of mind control and see it as mere tin-foil hat nonsense, then you are already a victim of CIA’s Operation Mockingbird, and should skip this section because you will not wish to be confused by the facts. It might even be harmful to your psyche to learn you have been manipulated by a form of mind control called disinformation, aka propaganda. Mockingbird put thousands of CIA agents directly into media at all levels from management to reporters and anchor persons… to make sure you got all the news that’s fit to distort.

The Church and Rockefeller Commission findings of the 1970s regarding CIA mind control research further revealed all manner of inhumane MC research and non consensual testing on unwitting human subjects. It is clear that among even worse atrocities, CIA was keen to develop drugs that could control a person’s mind to the point that they would do anything commanded, even to kill themselves or others; the Manchurian Candidate, or ‘programmable person.’

There is much more I could write on this topic, but I do not wish to cause readers not open to the notion to stop reading, for there are more important things yet to discuss. I suggest Alex Constantine’s book, Psychic Dictatorship in the USA, for those wanting the gory details, and my book, MC Realities, to learn about the development of psychotropic mind altering drugs (mind control enabling drugs) by Eli Lilly under ex CIA director George Herbert Walker Bush and Dan Quayle as company executives… the very drugs we are about to see quite tied to the type of gun violence of which this article speaks.

When media controls what you think, you are a victim of mind control

Gun violence: Look at the Statistics

The first mass shooting of note in America was the Texas Tower sniper murder of 13 at the University of Texas, Austin, in 1966. From that time forward there have been countless incidents, so many, in fact, that media hardly thinks to look at the big picture, all-too preoccupied with the gory details of the most recent events. Convenient for them and government, perhaps…

…as it does not serve hidden agenda if you compare today with yesterday and learn that there is a pattern of significant relevance which is clearly being withheld from you. You make your decisions based on the colored view of blood-red tinted glasses fitted with blinders of ‘current news.’ There is a reason I call it the Military-Industrial-Intelligence-Media Complex. What makes you think ‘free press’ has anything to do with American media, a media largely controlled by less than a dozen people, exactly as the Congressional Record cited to be all that was needed to control the press. The statistics will reveal it all…

SSRI medication was developed by CIA as a mind control enabling drug

What mass shootings and assassination events have in common:

It is so rare to find otherwise, that I dare say every such shooting has many, if not all, of the same key ingredients in place: a) prior psychiatric care involving the use of prescribed mind-altering drugs (pscyhotropics, generally of the SSRI variety — Selective Serotonin Reuptake Inhibitors such as Prozac, Zoloft, Paxil, and dozens of others); b) a triggering event based on emotional stress or trauma or the curtailing of or failure in treatment processes, such as failing to take medication or overdosing; and in all-too-many cases, c) the otherwise ‘coincidental’ peripheral presence in their lives of military, CIA, or other persons, firms, or organizations associated in some way with mind control technology.

Note: there is another kind of triggering event for the Machurian Candidate style of programmed shooter, the kind of person used as a disposable patsy, because they tend not to be very effective as actual killers. The best example is, perhaps, Sirhan Sirhan, who emptied his gun at Robert Kennedy but hit him, not, according to modern forensic review: Kennedy was shot from behind, and upward. Such persons are programmed in advance to do a specific thing upon hearing or reading a select unusual triggering phrase.

Such phrases are offered once to cause them to pay attention (throws a mental switch). It is then subsequently repeated twice close together to cause them to carry out the instructions (initiates a command sequence). Interesting, then, that in Sandy Hook, that a particular Web set published the following phrase three times, once as title, and twice in the text: “Sandy Hook Lingerie Party Massacre.”

This was published on the same day as the Aurora shooting, in which the film, The Dark Knight Rises, shows a map of the villain’s attack plans with Sandy Hook (a district of Gotham City renamed to Sandy Hook for the film, for some unknown reason) as the place next to be struck. And yet, it is strange things like this which get us conspiracy theorists labeled as ‘nuts’ by media that you might be more comfortable in ignoring us, instead of thinking for yourself. How comfortable are you, right now?

The rush to gun control serves the NWO agenda for a one World government

SSRI drugs cause violent thoughts and deeds as side effects

SSRI drugs are killers, both by suicide and by murderous acts committed by those taking them. There is a remarkable summary of this phenomenon at ssristories.com, a Web site which just a few years ago listed perhaps only 50 or 60 examples, but today cites about 5,000 cases which illustrate the problem. The link sorts them by the general nature of the case, but you can sort by date or location, or any other heading.

A quick review reveals some startling examples, which I shall first outline in terms of the dangerous aspects of the drug class and its propensity for sponsoring unchecked violence in patients, and then more specifically relate to mass murders and assassinations, gun violence ahead of other forms of murder.

Why do ‘scientists’ and ‘doctors’ of excellent educational qualifications fail to realize, in light of these known side effects: every physical person has a unique physiology, DNA, and dietary makeup, and thus, it is impossible to predict the results of a given infusion of chemicals into a body where, especially in the brain, the EXISTING balance of chemical makeup is not prepared to suffer alterations with kindly result. Why then, do they persist on guessing at initial dosage levels, and then upping the ante when results are not deemed adequate, until side effects make it clear the med will not help, and then switch them to another med, and start all over again? It is witchcraft-level insanity, and it is guaranteed to have negative outcome.

It is NOT science, nor is it MEDICINE.

It is important to realize even this massive list is only a tip of the iceberg. It ONLY represents reports by family members, doctors, organizations, and other select researchers who were examining and reporting purely from the medical viewpoint. Further, as many of the reports are voluntary contributions, it represents only reports from people who happened to learn of the Web site’s existence and who were moved to report, and, moreover, is limited to reports from people who came to realize the relationship of events to the drug. For this reason, you will not find mentions of assassinations of note, such as my research indicates should be included (name ANY assassination attempt in modern American history, and you will likely find it true).

Among the reports (and a couple of details from my own research) we find court rulings and law enforcement investigative findings which frequently place the blame squarely on the drugs, and not the violent person, in some cases causing the courts not to elect punishment — even for capital crimes involving death. Here is your summary of drug induced violence:

Suicides are very convenient in a conspiracy

Let’s talk suicides:

1)   Over 250 reports involve suicides only, and many times that number include suicide as aftermath to other violence, such as arson, murder, and so forth. Suicide is almost the norm after such drug-caused violence;

2)   One attorney reports he has had a total of 73 calls about suicides from just one specific SSRI;

3)   Indiana county study shows 41% of all suicides involved SSRIs

4)   Wisconsin study shows 54% of teen suicides involved SSRIs

5)   Sweden study shows 52% of women suicides involved SSRIs

6)   Report shows US military suffers 18 suicides a day, 40% on SSRIs

7)   Multiple reports of suicide pacts where all participants were on SSRIs

8)   Another 200 questionable deaths listed which may have been suicides.

9)   EVERY SSRI lists suicidal thoughts as a side effect

10) Suicide attempts often involve the most painful and horrific, and least effective means, such as blow torch, grinders, etc., or the most illogical, such as trying to jump out of an airliner, or stripping naked and wandering off into a winter wilderness.  Suicide by Cop is quite popular, as are head-on and other fatal car crashes, for which statistics are likely quite under reported.

Manchurian candidate murderers are always ruled as acting alone

Let’s talk murders:

 1)   Over 1,200 reports of murder attempts, about one fourth of them followed by suicide or attempts;

2)   Within one week of returning home, nearly a dozen soldiers on SSRIs killed their wives;

3)   Methods vary widely: when guns were not available, almost any means might be employed, including additional reports under other categories, such as vehicular homicide, arson, and so forth (roughly another 100 cases). Details follow.

 Conspiracy must exist if there is a cover up in place

Of interest (or no interest, really) to TSA and FAA:

1)   Nearly two dozen incidents involving violence on an airplane or at an airport;

2)   Individual reports of eleven private plane crashes killing 24 people blamed on SSRIs;

3)   Airline Industry study reveals 100 crash pilots using SSRIs;

4)   At least one hijacking was initiated by an SSRI user.

 No one goes ‘crazy’ without some triggering event – contrived or coincidental

How about kidnapping and hostage taking?

 1)   About twenty instances linked to SSRIs;

2)   Seven instances involve schools and students as victims.

 When you hear ‘lone shooter,’ think ‘conspiracy cover up.’

How about arson and bombing?

 1)   80 arson events, three involving schools, two events where school administrators on SSRI set fires at home;

2)   35 bombing instances, two involving schools.

 CIA lies to put their own men in post of Chief, Spokesperson, and head of Internal Affairs

Other Killing Sprees?

 1)   Remember the rash of US Postal Worker rage shootings? Most were SSRI;

2)   About two dozen instances of fast food chains, trains and busses, churches, banks and other offices, and even a country club and a nursing home;

3)   More than 30 incidents at schools, about 1/3rd of which were SSRI, including virtually every event which made national or international news;

 Gun control is a codeword for police state control

And when there is no gun available?

 1)   One 17 year old holds 20 children and teacher hostage at point of a sword. So if you take all the guns, better get all the swords, too;

2)   A Mother attacks her son with a sword. See what I mean?

3)   School day care center looses two children and an adult to a knife attack. After all, knives are just short swords, right? So, if you are going to take away larger gun clips, but not small, then we presume you would take swords, but no knives. What did you gain?

4)   A woman laughs as she uses her car to chase down three kids at an elementary school. Alright, so now no one can own a car, right?

5)   Man attacks 11 kids and 3 teachers with a machete. See what I mean?

6)   Numerous fires started with intent to kill people in apartments, stores, offices, and schools. Starting to get the idea?

7)   The johnstonsarchieve.net Web site lists these additional incidents (scroll to events with ‘criminal’ cited instead or ‘terrorism’) with no known tie to SSRI drugs, but are cited here because the killers had no guns:

    1. Bath Michigan man uses dynamite to kill 40 children, himself, and the School Superintendant over inability to pay school taxes causing foreclosure of his farm. So if you take all the guns, better also take all the materials used to make explosives;
    2. Poe Elementary playground attacked by man with bomb in suitcase killing himself, his son, the Principal, a custodian, two other students, and injuring 17 other children. See what I mean?
    3. 63 students and adults were burned to death by an angry student at a school dance in Goteborg, Sweden (gun control in Sweden is strict). So if you take all the guns, better take all the gasoline and matches;
    4. 67 teen students died from an arson attack on the dorm at Kyanguli Secondary School in Machakos, Kenya, injuring 19 others. See what I mean?
    5. The Elementary School of Ikeda, Japan, lost 8 students and another 13, including two teachers, were injured by a man with a kitchen knife (there is total gun control in Japan);
    6. 72 kindergarten students and teachers at Zhanjiang City, China, became dangerously ill from rat poison put in their salt by a competing school operator (there is total gun control in China). So now there can be no household poisons?
    7. That same year, 2002, two men upset with contract provisions with Number One High School in Changed, China, put rat poison in breakfast food making 195 children and teachers seriously ill. See what I mean?
    8. Two years later, Number Two High School in Ruzhou, China, suffers an attack by a man who kills 8 and injures 4 students with a knife while they sleep in three separate dormitories;
    9. And yet the next year, a man who had lost his job, again in Zhanjiang, attacks several Nansoon Middle School students with a kitchen knife, injuring 8;
    10. In Jikari High School, Yamaguchi, Japan, a student threw a homemade bomb made from nails and emptied firecrackers into a classroom, injuring 58 students and the teacher. Might as well do away with the 4th of July celebration, anyway, since you are getting rid of the Constitution and Bill of Rights;
    11. In 2010, a man killed three students, and a teacher, and injured 20 other children and staff at the kindergarten of Zibo, China, once more with a knife;
    12. Another machete attack took place in the 5th grade class of the Talisayan Elementary School, Xamboanga City, Philippines, killing one student, a teacher, and a grandfather of a student, and injuring 4 more students and two teachers (gun control in the Philippines is near total);
    13. If you wish more examples, there are thirty more at the bottom of this wikipedia link on list of rampage killers, including at least two alleged deliberate crashing of passenger jets. So let’s put TSA and the FAA out of work and ban aircraft. After all, you do want to protect people from violence, right? That really IS your motive for taking away guns, RIGHT? Sorry… I didn’t hear your answer.

 If you do not own a gun, you do not own your government

And what about when other citizens nearby ALSO have guns…

…the guns they want to take away from you and me? The news of such events that does not make endless headlines because it does little to support gun control wishes of those who seek total control over an unarmed public? A mention the day it happens is as good as it gets, as a rule. Thanks for much of this compilation by gunwatch.blogspot.com:

 1)   A 1995 mass murder for drug effort was spoiled in Muskegon, MI, when the store owner, despite being shot four times in the back, managed to use his own gun to scare off druggies who had planned to kill everyone in his store;

2)   A 1997 high school shooting in Pearl, Miss., was halted by the school’s vice principal after he retrieved a pistol he kept in his truck;

3)   A 1998 school dance  for Parker Middle School (Edinboro, PA) shooting saw one teacher killed, and anther teacher and two students wounded before a man living next door forced the shooter to surrender by getting the drop on him with his shotgun;

4)   A 1999 gun shop owner with concealed pistol shot a gunman to the ground who had brought 100 rounds of ammo with him to ‘go out in a blaze of glory’ at, of all places, a shooting range in California (a guarantee he would get his wish);

5)   A 2002 shooting at Appalachian School of Law in Grundy, Va., came to an abrupt conclusion after three had been killed and three more wounded —when two students, unbeknownst one to the other, ran to their cars to retrieve firearms and confront the shooter with threat of crossfire;

6)   A 2005 shooting which started at the Smith County Courthouse in Tyler, TX, and involved high-speed pursuit, was ended because of the intervention of Mark Allen Wilson, who had a legal concealed carry weapon. This one did not end as well as the others cited, herein, as Wilson was himself killed by the shooter, who was wearing a bullet-proof vest. However, the exchange of fire allowed Police who had been kept at bay to end the matter with fatal shots of their own. This was after the shooter had already killed his ex-wife and wounded his own son, and wounded three lawmen in the melee;

7)   A 2007 gunman attempting to kill parishioners of the New Life Church in Colorado Springs was only able to kill two before being shot by an armed retired Policeman who had changed his mind about going to church that day because of a previous like attack on a church in Ogden the prior week;

8)   A 2007 mall shooter in Utah, after killing five and wounding four, was shot dead by an armed off-duty police officer;

9)   A 2008 shooting in an Israeli School (the Mercaz HaRav massacre) was ended by shots from a student and off-duty policeman using personal weapons, who entered the school with such intent after hearing shots which killed 7 teens and one teacher, and wounded ten other students;

10) A 2008 Winnemucca tavern shooting was ended after two deaths when the shooter, while reloading, was shot dead by a patron with a concealed carry permit;

11) A 2009 workplace shooting in Houston, Texas, was halted by two coworkers who carried concealed handguns;

12) A 2009 College Park party was interrupted by two gunmen who counted ten guests and then counted bullets to insure they had enough. After separating the Men and Women one of them started to rape one of the women, but was ‘coitus interruptus’ by shots from her boyfriend, who killed one and drove off the other gunman;

13) A 2009 restaurant robbery attempt by two gunmen Anniston, AL, was thwarted when one of them threatened the life of a patron who was hiding, only to be shot dead by the customer, who had also prepared his concealed pistol for possible use. A few shots were then exchanged with the second gunman, who was critically wounded;

14) That same year, a convenience store in Richmond, VA, was  robbed at gunpoint, the clerk being shot and wounded, and other patrons being shot at before the robber was shot dead by a patron with concealed carry permit.

15) A 2010  Mills, N.Y., shooting incident where the gunman, an angry customer, intended to kill six employees (he had a ‘death list’ of their names) of a cell phone store was, after opening fire on his first victim, himself shot dead by an armed off duty policeman with concealed weapon.

16) A 2012 RV park shooting incident in Early, Texas, was ended by a resident with his pistol as the gunman, after killing two people and their dogs, then held Police at bay with his scope equipped rifle;

17) A 2012 church shooting in Aurora, Colo., was stopped by a member of the congregation carrying a gun.

I leave you with two things, the first being: In Australia, where total gun control has been enacted (confiscation to establish an almost completely unarmed public), in 2011 there were STILL 94,000 shootings that took 29,000 lives… with not one civilian able to defend themselves. In America, the one spot where gun violence is rated worst, oddly enough, is the District of Columbia. Let’s compare:

There, the 2011 death rate by firearms was 12 deaths per 100,000 population, and that’s in a country where gun ownership is 89 guns per 100 adults. Compare that to Australia where it is now roughly 6 guns per 100 (est. by using UK provided figures), where deaths are 131 per 100,000.  Does that sound like gun control works as proponents claim?

To get that information in media, of course, I had to go to England, because the American press won’t tell you the truth about such things. They got their information from FBI, which any US paper or news network could just as easily have done… but actual investigative reporting would not help government take away your gun, would it?

The second is this: Out of 10,650 murders by gunmen in Virginia, only 4 were by persons who had legally registered with concealed carry permits.  Criminals don’t need or seek permits, of course. These four deaths by legitimate ‘gun toters’ would seem somewhat balanced by the fact that there are about as many instances, the most recent being the Clackamas Mall shooting… where persons with concealed weapons elected NOT to use their gun to shoot at gunmen engaged in murder because they did not feel they could safely do so without risking hitting innocent persons in the line of fire, or return fire hitting such persons behind them. That is part and parcel of good gun handling safety training, which all firearms owners should be required to have: my idea of a ‘gun control law’ that might actually work some good.

But personally, I’d rather have open carry… I’d even be moved to wear a six gun and cowboy hat if the 1875 Colt .45 hadn’t been stolen from my family some years back (when I did wear it in public on occasion). Open carry is a silent and untold deterrent to gun violence. In Cuba, there is no standing army, because every capable citizen serves in the Defense Force (like the National Guard), and is issued an AK-47, side arms (many people pack), and even grenades. Result: LOW CRIME, and very few murders by these weapons. The same is true in Switzerland (different weapons, of course), so it has nothing to do with Communism, that it works.

Statistically, in the Old Wild West where wearing a gun was the norm, gun violence was also relatively low… (e.g., the murder rate per capita in Abilene was lower than any modern US city, today). There have probably been more shooting victims in TV and movie westerns than in real life in the old West. When almost everyone has a gun, politeness rules; even when confronting someone in an unpleasant situation, it was done with carefully chosen words.

SIR, I believe that Ace up your sleeve proves you are a card cheat — and the pot is therefore mine, unless you wish to object?” Given the choice, most villains would back down unless the odds were significantly in their favor… which gun control laws will surely provide them, one 2nd Amendment-eroding law at a time.

The Clackamas Town Center Shooter… me, my family, and friends


This one came closer than I’d like to those I love… and requires we make comparisons to Aurora.

Permission to repost if in entirety with all links in tact and credit to author H. Michael Sweeney, and the original blog at proparanoid.wordpress.com
Clackamas shooting compared to aurora shooting

Reading this post you will learn:

a) How the Clackamas shooting relates to me and people I love, personally

b) How it relates to the Aurora Century 21 shooting

c) That like Aurora, there are still mysteries and questions to be resolved

When the Mall finally reopened after the Police investigation, our family all went to the Mall and expressed our moral support. They had a nice Candle light vigil, and there was a group singing Christmas Carols. A lot of people had tears in their eyes, including me. We hung a Star on the tree in Memorial for victims and their families. I wrote simply, “Hope, Love, Faith, Life.”

I also recorded a music segment and sent it as a text message to a dozen people I thought would appreciate it. It ‘spoke’ volumes about coming together as a community and going forward under duress. But as it happens, this event was a bit closer to home, and some of my tears were not just for those reasons, but because of more personal details.

As an author and consultant on privacy and security matters, as well as abuse of power issues including crimes of the New World Order, I should be used to such nastiness by now. I’ve been involved with investigations or other direct confrontations resulting in capture and prosecution a whole range of bad guys, including going head-to-head with terrorists and dirty cops, with three and perhaps five attempts on my life for my trouble. Read about it.

But no. I’m not used to it.

My wife has come home to find Men in Black fleeing our home using walkie talkies. People have tried to break into our home while we slept three nights in a row, and they did eventually gain entrance while we were away and ‘did things.’ I could spend an hour telling you about one man (a Parole Officer) who, with his coworkers and Bounty Hunter friends regular followed us… followed us to a birthing class where we observed him covertly meet with a member of the class who tried to get friendly with us… later identified as a Naval Intelligence Officer.

I was investigating the Flight 800 shoot down at the time. I could go on like that for some time, actually, with endless tales of Men in Black, FBI, CiA, Secret Service, and even one confirmed NSA and MI-5/6 spook. Even today there is the odd event, because I often cross swords with client opponents, often some of those same players. Despite all that, I’m still not used to it.

Aurora shooting compared to clackamas shooting

About Clackamas Town Center

Clackamas Town Center, a few feet from where shooter entered complex (from their site – click)

One of our twins currently works at Sears at one end of the Mall, as did her husband until recently. The other twin works at Penny’s, at the opposite end of the Mall. In the center of the Mall on one side we find the Century 21 theater and its adjacent food court where the shooting is said to have taken place. Opposing this, is Macey’s. Both my Wife and I used to work there… and my Sister-in-law subsequently works there, now.

The story goes this way: on Tuesday, Dec. 11, a young man whom I will not honor by naming, hurriedly left his car in the parking lot and rushed to the Macy’s exterior entrance, dropping at least one ammunition clip as he went. He was carrying an AR-15 .223 rifle almost identical to the one used by James Holmes, and wearing a ‘white mask.’ Once inside, he ran through the store attracting much attention and causing some due concern. About four seconds after running past my Sister-in-law at the Cosmetic’s Department, he opened fire. It was 3:27 PM, according to a cash register transaction at the same instant. Police say there were easily 10,000 people in the Mall at that moment. Shudder.

At 3:27 on the day before, I had been at the Mall, myself. I was in the food court where I struck up a conversation with the young woman who ran a cupcake kiosk at the edge of the food court closest to Macy’s interior entrance… where the shooter would be appearing the next day. Had I had that conversation on Tuesday instead of Monday, I would have observed first-hand the shooter as he skid to a halt and prepared his weapon, and opened fire:

He shot a woman in the chest and killed her, likely instantly. She was Cindy Yuille, a Mother of 54 years who looks very much like my Sister-in-law, and is about the same age. I shudder. He also shot in that same instant a 15 year-old teenage girl, Kristina Chevchenko, who suffered serious injury but is thankfully now recovering. She looks like a neighbor girl, and actually lives within a healthy walk’s distance from us. I shudder. He then turned the weapon on the cupcake lady, and fired but missed. As I could have been there, and had spoken to her the day before, I shudder.

Other shots fatally took down Steven Forsythe, age 45, and Father of two. He was one of those dynamic and widely admired and loved individuals who seemed to be involved in everything good, including being a high school football coach.  He also lived a walk away, and was a personal friend and business colleague to one of my own friends and business colleagues. I shudder.

The shooter, it is estimated, fired some 60 rounds before fleeing and, perhaps at seeing Police were closing in, took his own life. Early in the shooting, just as in Colorado, his gun jammed. By the time he could clear it, most everyone had taken shelter, many into stores where employees were herding them into secure back rooms and locking everyone behind steel grates and heavy fire doors. Kudos, Clackamas TC!

Had their quick thinking and selflessness not been so…  had the gun not jammed… had the shooter been better prepared or not been wearing a mask to partially restrict his view…  had some people been confused by the echoes and run toward the shooter instead of away… I shudder.

Now, please allow me to change directions for making a couple of points. It was not that many weeks ago that one of my most popular blogs was on the Aurora shooting. I wrote it to raise 25 questions no one has asked, any one of which point to James Holmes as a patsy in a false flag terror event. I also revealed specific potential motives for outside parties to be responsible, with proofs of viability.

Aurora and Clackamas shootings compared.

Clackamas and Aurora Have Troubling Similarities

a) both alleged shooters were young troubled men with psychiatric problems (which we now hear again in the even more tragic shooting of 27 in Connecticut). This is a very tired refrain heard time and again in mass shootings, and there are reasons for concern associated with CIA’s MK Ultra and related mind control experiments;

b) both wore all black. One wore a gas mask and, sans mask, was ‘made up’ to more or less look like ‘The Joker,’ while in Clackamas, it was merely a ‘white mask.’ But there is a problem there, too: conflicting reports describe it as three distinctly different kinds of masks, and for some troubling reason, Police decline to confirm WHICH ~ a Michael Meyer’s Halloween Mask; a Jason’s style Hockey player’s mask; or a Guy Fawkes (We are Anonymous… expect us!) mask;

c) both used the same weapon, and AR-15 .223 variant. The weapon jammed and prevented more carnage;

d) both fled to no avail, which begs the question, why bother? Holmes just sat in his car and waited to be captured without resistance, while in Clackamas, the shooter took his own life. Police found him dead, sans reports of hearing or seeing him shoot himself, but why? Why wear a mask, and why run if you were going to kill yourself?

e) both incidents suffered conflicting reports as to the number of shooters seen and their whereabouts at any given point in time, implying a possible coordinated assault. In Aurora, there is considerable evidence this is so, but in Clackamas, at least thus far, we might presume it to be normal confusion causing misconception and mistaken accounts.

f) both took place in or at the virtual doorstep of a Century 21 theater. On first reports on Clackamas, I was very concerned about this particular coincidence, but am less certain it matters, now ~ because the actual shooting began in the area central to the mall at the edge of the food court, and the shooter entered from the opposite side of the complex from the theater. Had he intended to target Century 21, there was an entrance right there.

g) both enjoyed remarkably prompt Police response. In Clackamas, the shooter was not very bright. The Mall is located about one block away from the Sheriff’s Office, which also has a secondary presence right on the Mall lot with about a half dozen cars. In Aurora, the nearest facility was several miles distant and quite away from common arterials.

h) in both, Police were not terribly forthcoming with facts early on (SOP). However, mistakes made by Aurora Police in their public statements (see my post) were not present in Clackamas.

Still, with all these coincidences, I shudder. Doubly so because of the horror in Connecticut, a murderous rampage of which I cannot bring myself to write… except to say that I shudder to consider that three such shootings… four if you count the Sheik Temple shooting in Michigan… all within a window of a few weeks of the same Season… and all on the heels of a United Nations Treaty attempt to ban all firearms in civilian ownership.

Clackamas is a community of people with whom I share a happy existence in a beautiful and generally peaceful setting. Good people. So I shudder at the closeness and ‘what if’ nature of the Mall shooting as it indeed came all-too close to impacting my own family in even more personal and tragic ways. We were lucky. Others families and friends were not.

But I shudder also because all the communities where these shootings took place are like that… and in a country where government seems to be preparing itself for war with its own citizens and, in local preparation, would find any such effort a lot easier if there was some way they could ban all weapons and collect them, first. It is for my me and my family that I shudder, yes. But also, for my country and a thing called the Constitution.

Many people died when those shootings took place. But I fear the Second Ammendment may also be a casualty given the explosion of talk about gun bans as result, especially because of Connecticut… and in thinking it possible…

I do indeed shudder!

TOP 5 Reasons for, Signs of, Methods of, and Solutions for the Internet Spying On YOU


TOP 5 Reasons for, Signs of, Methods of, and Solutions for Internet Spying On YOU

The threats are many, sophisticated, and endless. Solutions need not include PANIC (usually), and are largely simple and inexpensive, though nowhere near being fun.

Copyright 2012, Proparanoid Press, H. Michael Sweeney — All rights reserved. Permissions to reproduce granted on request, only.
Top five reasons for Internet spying
 

English: Frame of an animation by the U.S. Fed...

This article is especially useful to the TI — the political control technology Targeted Individual, and any person who has reason to believe someone is actively trying to snoop their Web activity or who deals in Web activity of a highly sensitive nature.

My approach to addressing security and privacy is not merely talking about the threats to educate, but how to detect if one has a problem, and then to provide a functional solution. It’s one thing to educate, another to illustrate, and yet another to resolve. Only by all three, is the end result adequate, provided there is no failure along the way which impedes.

Reading this (lengthy, but in outline form so you can quickly navigate to areas of interest) article, you will learn:

• There are 5 basic kinds of privacy compromise/targeting to worry about;
• There are (often) 5 symptoms or clues targeting is taking place (when not blatantly clear);
• There are (often) 5 basic methods of carrying out such targeting;
• There are (often) 5 things you can do in defense or response;
• There are some very reliable and free Open Source tools which can help reduce risk;
• There are some new and potent tools for those more concerned or more at risk of targeting.

By way of introduction, I write as published author and consultant, lecturer, on privacy and security matters, abuse of power issues, and political control technology. My purpose in writing goes a bit beyond the obviously important educational issues, or even the somewhat obvious self-promotion of my books. That is because I, with the help of others, have subsequently developed some specific tools and services which additionally address the threat to privacy and security inherent in daily use of the Internet.

One of these is a completely secure email alternative called NeVir Spies, and a new concept I’ve temporarily called Web Walker which provides a totally secure Internet alternative with some very unusual features and capabilites which go well beyond the topic at hand. More on these tools at article end — very informative.

That said, there are many people much more savvy than I on WEB security (as opposed to real-world security problems). So, if after reading this, you want to know more, there is likely better advice than mine out there, especially if you prefer it more technical in detail. This post, however, I’m betting, is the most centralized one-stop reading resource you are likely to find, and it therefore covers more bases, more comprehensively, in general.

And, speaking of ‘general,’ some general advice applies to all Web security issues, ‘in general.’ It’s all common sense, of course, and you’ve heard (most of it), before, but I’d be remise if I didn’t include it here in case you have not:

• Frequently change passwords and if anything odd is going on, change ALL passwords.
• Do NOT use simple to remember passwords based on ANYTHING about YOU, and DO NOT use answers to security questions ABOUT YOU. If you must use simple to remember passwords and face security questions, base them and the answers on someone famous who died long ago, someone random. Then all you have to do is remember their name, and go look it up on the Web if you forget the hard part.
• Avoid writing passwords down, because you should…
• Remember that your computer security is only as good as security of access to your computer. If anyone can get to the computer, there are many things they might do to compromise its security, obtain passwords, etc. If it does not stay with you or reside on the other side of a pickproof lock, it is at some risk.
• REGULARLY run your Norton’s or similar.
• Never respond directly to an ‘official’ email from any account requesting verification of information or asking you to log in using a link unless you were expecting that exact email to arrive. Manually use the Browser to go to the site and log in.
• Never undertake financial transactions or fill out informational forms involving personal information at a Web site unless the url starts with https:// instead of http://. That little added ‘s’ tells you it is Secure by means of several means not present in general surfing.
• Avoid downloading files or programs from unfamiliar sites of questionable repute, especially when they are in other countries and the topic is something you wouldn’t want people to know you were interested in (i.e., porn, drugs).
• Never put a long list of email addresses in the To: or Cc: blanks unless those people are already conversant collectively (do not assume just because you got an email with that long list that this is so). Instead use Bcc:, or you violate THEIR privacy. Tell everyone you email to to never include your email on such a list unless Bcc:
• Never give out someone else’s email contact unless you get permission for the introduction — just as if it were a phone number. Offer instead to pas the email addy of the inquiring party along to the person in question.
• Here are ten more technical things which you should be aware of explained more fully at georgedillon.com, (linked for you, here) as they deserve their own explanations (I especially endorse ‘Do not trust Microsoft products,’ including their operating systems. Historically and almost consistently, in addition to select spying instances of actual on customers by Microsoft itself, they are poorly designed with respect to security issues and hackers/attackers take advantage. They are the primary source of the great weakness of PCs compared to Macintosh for security and reliability, and the reason so many security steps and layers are advised: 
 

Top five reasons for spying on you

5 Top Reasons For the Internet Spying on YOU (etc.)

It happens to us all, every time we use the Web. Most of it is undetected, and generally harmless. Too much of it eventually bites us in unexpected ways beyond our control. Some of it is dangerous, even beyond the draining of checking/savings accounts or total identity theft.

Most of it we volunteer unthinkingly, especially with what we do on social networks like Facebook, which is a giant spying mechanism of great social usefulness to us, and a goldmine of information to corporations and government. Every single mouse click, almost, is giving away information.

Some information we have stolen from us despite the care we think we have exercised, and that would seem to most of us to be rather rare, but I happen to know that more of it goes on than we hear about, and we are often victimized in ways which we do not detect, and do not realized have harmed us, or their potential to do so. Some information is used against us in ways that are part and parcel of further assaults on privacy and security. Read on…

1)   Criminal Financial Gain. Everyone is a potential victim, and we all get shot at in hopes it will be us. Before you can be Phished (tricked into revealing confidential information), they have to know you are an Netizen (a WWW user) and where on the Net you are (your email, social network and Group memberships, etc.). So they snoop you out, and then snoop you for vulnerability (i.e., lack of paying full attention or even gullibility), and then phish you or attack with a virus or similar technical assault; Signs, Methods, and Solutions:

a. You get email from someone you know which promotes (something) which urges you to open a file or take an action, but which is not quite like what they would normally send, and the message accompanying it is overly simple so you can’t tell if it ‘sounds like something they would say.’ This likely did NOT come from them, and means yours or their email account has already been hacked or, far less likely, both theirs and your email addresses were obtained from someone else who was hacked. If you open the item or take the actions urged, you risk your email account or computer being hacked, infected with a virus or similar, or becoming a Scam victim via participation; What to do about it:

i.   Do not take the actions suggested, therein. Natch!

ii.  Contact your friend and advise them their system (or a friend’s) has likely been hacked, with explanation. They should change their Web passwords and run their Nortons or similar. You should do the same (do it regularly, at least). Macintosh users may yawn at this notion, but we are not completely impervious from suffering system issues resulting from failed virus attacks and eventually resulting in unwanted operational inconveniences.

iii. Delete the offending message, unless your friend confirms they really did send it, and you care to follow up with it knowing it actually safe.

iv.  Advise your friend that they should notify everyone on their email list of the situation to insure they do NOT respond to the described message, with apologies if they should have been a recipient.

v.   Contact all your other friends via all avenues (email, social networks, groups, in person) with similar warnings that such a message is dangerous and should not be acted upon regardless of who it seems to be from.

 b. You get email from a stranger (as if they know you or perhaps accidentally reached you through a typo) or a ‘company’ similar to the (a, above) in nature. Often, it will be a message indicating some action or obligation has been taken on your behalf which you do not want, such as confirming an order for Pizza, an airline reservation, subscription, etc. Or, it may simply be annoying SPAM. This is likely a snooping expedition and may be a phishing attempt, as well; What to do:

i.    Do not respond, not even to unsubscribe to SPAM (unless you repeatedly get the same offer from the same address). Such risks confirming your Netizen existence and defines you a working target, or worse, directs/redirects you to a phishing experience.

 ii.   If concerned the obligation really did take place, go directly to the Web site of the entity involved and research it there. Often, you will find they have options for reporting fraud, phishing, etc. Document (screenshots, copy/paste/witnesses) what you find/do, so you can get out of any wrongful obligation the turns out later to be existent, after all.

iii.  Create a filter in your email Client or Web mail options to block similar messages based on key word content and sender information.

iv.   Keep the message for a period of 90 days in case of unexpected consequence to be used with your documentation from step (ii), above.

v.    Same as step (v, item a), above.

c. You get a message from a stranger who wants to help make you rich, is sexually or romantically reaching out, or has some kind of deal too good to be true;

i.   Same as steps (i, iii and v), above.

ii.  If the message names a legitimate business or agency, consider step (ii), above. The Secret Service has a Web site for such complaints as well. However, IMO, they simply gather statistics and seldom do much more with the information. I have more information about how to detect and defend against this type of fraud at my Web site than do they — and in glorious color to make it easier to absorb.

iii.  Same as step (v, item a), above — but you need not do so every time, you simply want the general warning out there as an educational exercise.

d.  You get the famous Nigerian Scam (aka 4-1-9 Scam). Someone rich died or some other event has caused millions of dollars to be in limbo and someone who just happens to have access to it also just happens to come by your email address and wants someone to help share that money with him through some simple sounding and fail-safe scheme. They always ask for information about you. There are many other clues and signs, as well as the link (above) to my Web site.

i.     Same as all steps in (c) above.

e.  Variations of the above (a through d) delivered not by email, but via a social network or Group posting;

i.  Same as if from email source, except that the social network or Group may have special reporting options as well; such as a moderator to whom it should be reported.

Figure from actual Google Patent Application; Providing digital content based on expected user behavior.Got it?                                      I knew you would understand. My job here is done.

2)   Commercial Financial Gain, at your expense in a quid-quo-pro sort of way. Everyone IS a victim in that same way, or worse, but it is completely legal. There is zero information about you which is not valuable to someone for this purpose, and it is therefore a commodity almost every major player seeks, uses, trades or sells to make money based on the definition of ‘You’ and your preferences, likes, dislikes, and habits; Signs, Methods, and Solutions:

a.  You get SPAM email or Web pop ups or ad banners which reflect your general interests, either at the moment (e.g., you are searching for something the ad relates with), or overall interests;

i.   Web search engines use predictive marketing analysis (aka predictive analytics) about your search terms and what they know about you already through prior uses or shared information to ‘guess’ which of their advertising clients will most likely earn your business with an ad;  consider using a Web Anonymizer  (see separate dialog at article end) which veils your identity altogether . However, this will mean that your favorite Web sites will not know it is you and will not support auto-log in for account information, custom settings, etc. That does not mean you cannot manually log in and continue normally from there, unless an extremely secure site such as a Bank.

ii.   Many Web sites use analysis of what pages you visit and how long you stay on a page, and what buttons you click or roll the mouse over… also in predictive marketing analysis; not much you can do about that short of not going to the Web site — but it’s a matter of quid pro quo. You get something about them from their Web site, and they get something about you for your having done so.

iii.   Each Web site you visit may exchange ‘cookies’ with you, which are data bits which allow that Web site to recognize and acknowledge you as a prior visitor to when you next return, which in turn can further reveal what you like for predictive marketing purposes; consider turning off your Cookies option in your Browser Preferences. However, doing so will mean your favorite Web sites will no longer recognize you when you return, and auto log in, custom features, etc., again won’t work properly. So you have to remember to turn them back on if you want quid pro quo benefits.

iv.   Some Web pages may contain ‘pixel bugs’ (aka Web bugs, picture tags, pixel tags) which sense your presence on the page and reports that information (to someone). Pixel bugs are sometimes covertly placed without the page owner’s being aware, but more often, they arranged for it as partners with some third party. This works like cookies for marketing purposes, but can be more powerful. They are built into the graphics which make the page visually or informationally attractive. Often, a graphic thought to be popular is ‘bugged,’ and placed on the Web for others to copy and use, greatly amplifying its value; learn more, including some technical defensive options, here.

v.   VERY DANGEROUS in some cases: Many software downloads and some purchased software contains back door reporting routines to monitor what you do on your computer (may be limited to a given type of activity, such as Browsing, or specific matters related to use of the software, or may be more invasive, including obligating you to things against your best interests, sometimes with a financial impact). This has in the past been especially true of certain free games, on-line TV watching utilities, select computer utilities, and even major purchased software packages and operating sytems (yes, even big firms like Microsoft); READ the fine print in the user agreement and know what you are letting yourself in for (the nature of what they consider quid quo pro). Note: some illegal use of this method has been encountered, where the compromise of privacy/security was NOT mentioned in the user agreement, essentially converting the package into a virus in function. Know the reputation of the source, search the Web for complaints (but remember, no one makes a product that does not generate complaints from someone about something, and that often, problems arise which are user/user system specific because of unique configurations of their system or usage — so READ the complaints for relevancy to your use and privacy concerns).

map

From Excellent Network World article (click): ACLU Report: Spying on Free Speech nearly at Cold War Level

3)   Political Gain, often in opposition to your best wishes. Identical in nature to Commercial Financial Gain, but used for political purposes to sway opinions, most often with disinformation calculated to target what defines ‘You.’ Your opinions are shaped for you in subtle ways. It is a form of Political Control Technology. This often leads to item number 4, below, where you fail to bend and your bending is deemed extremely important; Signs, Methods, and Solutions:

a.  Also the same as Commercial Financial Gain, except that you can more easily be aware of and control your interaction with political topics most of the time. The tricky stuff is the disinfo built into what should otherwise be nonpolitical in nature. Everybody has a belief structure, and it easily finds its way into whatever they write with or without their conscious intent, but there are people paid to write things ‘off topic’ in ways which infect on purpose, and with great scientifically calculated psychological impact;

i.  In addition to thoughtful reflection (be wary, think logically and critically), it may help you to read up on the 25 Rules of Disinformation at my Web site (my most popular document with tens of millions of downloads).

b.  In Groups and Social Networks, you can count on ‘packs’ of members or friends participating in calculated diatribes, often staged arguments egging you to join in to get your views and or to alter your opinion. Often, the group is actually one person, a trained specialist (cyber troll) who has multiple fraudulent identities for the purpose, any one of which can troll for people to suck into more focused dialogs sans any need for staging an argument, but they usually join in at some point to ‘confirm’ the ‘validity’ of the preferred message;

i.  Same as (a, above), but actually, its easier to detect, even laughable.

4)   Political Paranoia, outright spying on you out of fear of what you believe or might do in their wildest nightmares of potentials. If you are an activist or outspoken in ways not in synch with the mainstream (politically incorrect) on ANY TOPIC, have participated more than once in a given topical protest movement, visited an activist’s Web site or site of the politically incorrect, YOU ARE A POTENTIAL TARGET. Governments (all of them) so covet their power that (most of them) feel any dissent or opposition must be presumed a threat and dealt with before it can actualize. This all too often leads to item 5, below; Signs, Methods, and Solutions:

a.  You find a sudden burst of requests for new social network friends or members to your group, and the dialogs/posts resulting soon thereafter tend to be inflammatory or inquisitive on political beliefs. Or, you find them somehow magically added without requests, or the requests read ‘secret request’ or some other no-such-thing-exists. You may also find others simply seem to dovetail perfectly with your beliefs with continual favorable commentaries to your own, someone trying to get close enough to you to pump you for information, later. These efforts can be as insidious as agent provocateur in nature, and/or attempting to build a comprehensive psychological profile of you for further targeting (item 5, next); What to do about it:

i.  Same as (a of item 3) above (be wary, reflective, and think critically);

ii. Do not REACT instinctively to inflammatory matters. Stop, Think (what is really going on, what to they really want), ACT (according to your best interests) — ACT, don’t React. This is a good habit to employ in ALL DAILY MATTERS as it will keep you out of needless arguments which harm relationships and impede daily progress. I wish I would follow this advice!

b.  You have a sudden explosion of SPAM and Phishing email, and the like. This may be an attempt by an Agency or Military cyberwarrior to infect your system with a spying virus for their own unique purposes. It can happen for other causes, too, of course, and is not a conclusive symptom in and of itself. But it is often coupled with curious events in your life and environment which imply some form of snooping in the real World; surveillance, following, surreptitious entries, odd telephone behaviors, etc.  This would be an escalation step less frequently employed — a preparation for (item 5, next), and most certainly part of it;

i.  Please consider my book or ebook (ProparanoidPress.com), The Professional Paranoid: How to Fight Back If Stalked, Surveilled, Investigated Or Targeted by Any Agency, Organization, Or Individual.

ii.  Review some of my other blog posts based on the book:

      1. In the Rearview Mirror: When You Think You’re Followed;
      2. Your Cell Phone is a Government Agent Spying on You.
      3. You find more sexually related outreach or SPAM than normal, or PORN related popups at the oddest times and places. Someone is trying to develop a psychological profile on you. See item 5 for a very caustic example of how dangerous that can become;

iii. Consider a one-time adventurous response to determine if it is targeting of this type, or generic SPAM/marketing outreach unrelated to spying as such. You WILL encounter unpleasant material by prurient standards. If it is spying related, there will be subtle signs. Again, see (item 5).

iv.  Do NOT respond at all (and for any such event where you elected option (i), above), delete or block sources where possible, as well as the specific message. Complaints may be in order if there is a means of contact, such as the Social Network or Group moderator.

NOTE: Any of (items 4, above, or 5, below) may additionally mean the FBI, CIA, DOD, or NSA (and variously other agencies of government, both foreign and domestic, as well as corporations, and criminal groups they partner or compete with) are specifically targeting your entire Internet activity (and beyond) by any number of means:
      1. All have admitted to or have been reported as employing signal capturing and analysis methods. A van can park near your home and capture router signals, or even just the RF (radio frequency) signals generated by your computer, in which case whatever is on your computer screen is on theirs. If you have a Cable or Satellite, or Microwave ISP source, those signals can likewise be intercepted and analyzed, either at your home, or at the ISP’s location. There will be varying success levels with the analysis attempt, and not everything will get through. Your phones and fax systems are subject to like attack capabilities, as hinted at in the above linked blog post.
      2. Most of these government bodies are not above employing virus attacks by conventional means. Just because you get a virus or were phished, does not mean it came from a criminal. It might be Men in Black, with or without legal authority, with or without official cause.
      3. FBI (and others with like tools) can obtain a warrant to install Carnivore or similar software at your ISP to gain complete access to your email, directly (and as many fear, everyone elses’ email going through the ISP). These warrants are incredibly easy to obtain. The new unconstitutional blanket warrants are even easier to get, and cover (everybody, more or less).
      4. Often warrants are not even necessary, especially with the larger ISP firms of the telecommunications industry flavor (think cellular), who give away information just for the asking if it comes from ‘the good guys.’ Many of these firms consider themselves extensions of the Federal Government for all practical purposes, and many (including Facebook, Google, et. Al) are invested in heavily by the intelligence community (CIA, most notably) who, in exchange, is granted unusual access to information and system control (ergo, they become weaponized when desired).
      5. The Internet was created by the military and ‘given’ to the public for use. However, the handful of key firms which constitute the bulk of infrastructure tools needed for the Internet to even function are essentially military-intelligence community contractors, which provides yet one more tool in the government’s spy arsenal.
      6. Internet 3.0 (a nickname for the effort to ‘improve’ the Internet by Congress) in the name of cyber security is eventually going to get past Constitutional roadblocks in Congress and will become a major censorship and spy tool for all government levels and agencies. If you have no clue, learn about SOPA and CISPA. See the closing section of this post for a breath of fresh air and relief.
      7. The Internet Kill Switch (another nick name — each government on the Planet wants one, including the United Nations) is likewise such a tool, one likely to be thrown whenever government does not like what we are doing (e.g., Occupy, especially after seeing what the Internet did to help overthrow Middle East tyrants), or want us to know what bad things government is doing (e.g., Martial Law, military takeover, extreme blunders that kill or destroy massively, etc.). The closing section addresses this, as well.

5)   Political Control Targeting, where you are deemed a viable threat to an agenda or cyber-powerful governmental (hey – I got hate mail from the Clinton White House and enjoyed much Web sabotage and other fun things while he was in office… and while Bush before him… and Bush after him… and Obama, now).

This means they fear you and feel they must deal with you more proactively, typically because their spying has revealed that other people listen to what you have to say and believe you, or your opinions are thought simply too dangerous to be heard (like many of mine, nasty truthsayer ‘terrorist’ that I try to be). Truth is oft seen as a thing too dangerous to be allowed free expression which might enable and empower a fully informed public, and must not be allowed to contaminate the lies of an errant government and/or a controlled media;

a.  Your social network starts having a lot of unfounded complaints against you resulting in curtailed services or functions, having to repeatedly provide your password, etc.;

i.  There is usually no recourse whatsoever, though I tend to ask my friends if any others are having the same problem, and complain so they understand the Social Network in question is infiltrated by government spying and engages in political control targeting (Facebook, that means YOU).

ii.  See this blog post for more detail on Social media infiltration and solutions.

b.  You start getting denial of service BOMBS — posting bombs to your social network or group, and/or email bombs to your email, which make it next to impossible to actually make good use of them for their intended purpose. I can get over 100 posts a minute, so by the time I see one from a legitimate friend to which I’d like to respond, and finish my current activity that I might do so, it’s scrolled off pages and pages away from access and very hard to find, and puts me thousands of posts behind in any attempt too keep  up. In email, it will be SPAM bombs (and watch out for that especially when it comes time to renew your Web domain name or other key matter — this is a tool to get you to fail to see the advice notices that you must act soon before the expiration date, and is how Web sites are hijacked by Men in Black;

i.  Same as (a), above.

b.  Porn redirects, where you find yourself unexpectedly at a Porn site, or by intention, end up experiencing the phenomenon referenced in item (4) above, which IS a psychological profile being run on you. A variation may be porn content or links magically appearing in your own Web content, or other signs of criminal hacking. Its not that uncommon, actually — just ask yourself, who benefits to figure it out;

i.  Consider running test to see if it is a psychological profile attempt (WARNING, if so, it should prove to be a disgusting experience). I suggest documenting the effort as described in (b of item 1), above, for your own protection. I’d tell you to use an anonymizer, except that if detected to be in use (easy to do), the test will fail:

      1. A step you may need to repeat six times or so before the answer is revealed: arbitrarily choose a link at the porn site to access specific content offered (a pic or vid). OK if that’s where it takes you, return and try again. But…
      2. If it instead takes you to yet another Porn Site, it may be a profile attempt. Now undertake step one at this NEW site. Again, repeat up to six times.
      3. If by the sixth new site you still remain conscious from the visual assault on your moral sensibility, and you have thus far encountered nothing but ‘normal porn,’ with nothing seemingly illegal, you are NOT being profiled, but simply a (would-be) victim of PORN scammers who make money off of redirects. The kind of site a porn addict would abhor but puts up with when encountered and abandons after experiencing multiple redirects.
      4. To make clear, if you INSTEAD start to see bestiality, torture/rape, pedophilia type images, congratulations: you have reached a CIA operated Web site (by some accounts, they have thousands of such sites). Don’t worry, it won’t land you in jail. That’s not their agenda. But if you continue to click on images, your sexual profile starts to be built. Once it is in hand, it may be used at some point to manipulate you or to target you with blackmail, etc, or sexual outreach intended to compromise you. So naturally, you shouldn’t click on those images. Hey, shame on you for even being there in the first place, right? Um… what was that URL, by the way?
      5. IMPORTANT. You cannot trust these and many other porn sites. Just visiting one can result in attacks on your computer’s security and your privacy, such as makes running Norton’s or similar IMMEDIATELY after the test a wise step. Again, Macintosh users should DEFINITELY take this advice regardless of the reliably resistant nature of their system. DARPA, the Defense Advanced Research Project Agency, undertook a special program evaluating the security of the Macintosh Operating System looking for ways to exploit it. I’m thinking they didn’t find any, given that no one else really has in the last three decades, but what does that tell you about governments potential intentions to spy and capabilities?

c.  You discover that at times, you can’t locate Web content that used to be there, can’t reach people by normal means, or you hear people can’t find your content, or reach you. It could be a Web glitch, or it could be that your Web activities or content is being selectively blocked, a form of sabotage known as black listing. This, too, can spill over into the real World — welcome to the daily life of being a TI.

i.  Its usually done at the Server level, so it can be at your ISP or the host ISP to your intended destination or recipient, or an intervening ISP between the them (most Web activity will relay the data through a daisy chain of a number of ISP servers making up the ‘Internet’). Start by contacting your ISP, and asking the destination/recipient to check with theirs, if you can find a way to make contact. Any decent whois service (enter whois in your search engine) can help with finding a way to reach someone.

ii.  You can employ a tracking utility to see where the series of relays between ISPs comes to a screeching halt, and contact them. I like VisualRoute because it is highly functional without requiring geek knowledge, but supports geek use, too. It can also help spot eavesdropping in the data stream and address other Web technical problems. Learn more here. There are a lot of other good ones out there, and computers have some built-in capabilites, per this video lesson.

d.  You should, with confirmations of any of the above, consider yourself under a full surveillance net, even though it may not yet be true — you need assume it true or soon to be true. Your home has been or will very likely be entered into covertly, bugs and or cameras placed, and you may eventually become targeted with electronic weapons (that is another topic altogether);

i.  Contact me immediately for a free Helps Kit and some free online consultation (its what I do). Do not outreach to authorities of any kind, as it is intended you do so that you might officially earn the label of paranoid, or worse. It is a means of discrediting you and part of an organized effort at making you a political, social, and ultimately, financial zero.

ii.  Increase your levels of awareness and review and improve security at home, work, and your vehicle. Talk to your family.

iii. Get my book, The Professional Paranoid. Natch!

iv.  Install a Primus pick proof lock, a lock designed for government needs and so good that government does not want you to even know it exists, and thus, the manufacturer (Schlage) does not talk about it, and their dealers (well established Locksmiths, only) try to sell you an alternative when you ask for it, even though they make more money on the Primus. Also, not all dealers are authorized to sell it. I have a long dialog on this topic with clients.

v.   Keep up whatever you are doing, because it surely must be Good in the Face of Evil, or you would not be targeted in the first place. Unless you continue to fight it, Evil will only get bigger and stronger — and worse for you, others like you, and our future generations. Do not fear them and their cowardly tactics. Remember it is THEY who FEAR YOU and your BELIEFS, and what you have to say or do about it so much that they are willing to risk revealing themselves as the true sociopathic fascists they are.

Top five solutions for Internet spying

Other Privacy Solutions Available

I mentioned Anonymizers (not to be confused with or thought affiliated with the group, Anonymous). This is a tool which can be free or for fee, can be undertaken by simply visiting an Anonymizer Web site and ‘activating’ anonymization per instructions found there, or by use of software they provide to turn it on or off at will on the fly. What it does is it strips away all elements of your basic user identification information, such as cookies and much more, and replaces it with their own, generic version. Thus when you subsequently visit ANY other Web site, it cannot possibly know anything personal about you other than you may volunteer once you arrive. You can play with one to see what it is like with and without use at anonymouse.org.

They don’t always have desired results, because a given site may refuse access for cause, or fail to function fully, or slow down a notable degree. Not a huge problem. The real problem is not that, but trustworthiness. There are a lot of anonymizers out there to choose from, some with very slick Web sites and marketing programs, which in my book, does not mean anything regarding trust, and if anything, is a mark against more than for trusting them. Perhaps I’m just living up to my name, and being ‘paranoid.’

But within a year or so of their first appearing on the Web by nobodies anyone ever heard of, and their popular use, they started going by the wayside and being replaced by newcomers, or merged or were taken over by other firms, and ‘improved’. To my way of thinking, governmentals and other smart people with agenda of their own, have sought to replace them or compete with bogus anonymizers which allow only THEM to see what you are doing.

Think about it… and how easy it would be to arrange, and in realization that if you don’t want others to know what that is, then that information may reflect something extra valuable, or which dovetails with someone’s agenda or political concerns. So they bait you, seeing you as perceived bad guys or as potential targets for (some agenda-driven purpose) to use their service that they may spy on you effortlessly. I’m especially wary of those based on downloaded software, which could afford additional backdoor access to sensitive information. I know there are good ones that can be trusted, but I have no way of knowing one from the other, for sure. Ack!

There is only ONE clear-cut exception I’m aware of, though any of the original firms going back to the 90’s in dating are likely OK, today, unless taken over or merged by some other firm, in which case I get nervous, again. The exception is called TOR (The Onion Router), which is Open Source. Open Source means public code that anyone can read (with some technical skill), and that being the case, it can’t be tampered with or contain threats to security without being detected and reported (that’s one advantage, the other being that it is FREE).

Yet TOR has its own inherent problem which should ALSO be addressed if used to send secure information such as an email message: you should additionally provide some form of adequate encryption of that content. This is a bit of a non issue with respect to simply visiting and using Web sites, however, though using a regular anonymizer AND Tor should likely make such visits even more secure. Learn more about anonymizers,  here, and more about TOR and the encryption issue, here.  Then there is also the greater issue of anonymous email, which you can learn about, here.

With regards to Encryption, that topic also deserves some comment. Your email service provider, likely your email client (e.g., Outlook) and Web mail (e.g., gmail), almost always provides for some level of encryption for security, much of it essentially functionless to sophisticated spying groups like government. I suggest that if you truly fear compromise of very sensitive data transmission over the Web, that you employ some heavier guns. There are numerous commercial products out there, but like anonymizers, I worry about built-in back doors with some of them. Once more, Open Source to the rescue: PGP (Pretty Good Privacy) continues to be a very popular and thus far quite reliable and easy-to-use solution. Learn more here.

Top five internet spying symptoms

New Solutions from Proparanoid

My approach to addressing security and privacy (de javu), to educate on the problem, provide a means to detect the threat, and find a means to resolve it. And also, again, I’m not particularly a Web technologist. So what follows are the results of a lot of thinking not just by myself with my approach in mind, but also with the help of people who know more than I do about Web security. We hope to advance the state-of-the-art in privacy and security.

NeVir Spies is nothing terribly new in the World, except with respect to how it is implemented and made available. It is in the category of a Virtual Private Email Network (VPEN), such as normally employed by large companies for internal email communications in an Intranet (a closed Web like construct for private corporate network connected computers). A VPEN is combined (for Web hopping between distant sites) with HTTPS, the secure form of Web servers (as opposed to HTTP, which are far less secure), to provide a truly secure email service with superlative features.

NeVir Spies is a variant on this theme with some added compenents which allow levels or layers of security and flexibility as the client may deem important. Like all commercially available VPENs, it is more costly than the free email accounts available with Web mail and through your ISP, who includes email with their monthly billing charges. It typically costs about as much as a good ISP, so using it effectively doubles your monthly outlay, but it gives you something the ISP cannot: assured email confidentiality, and some extra features in most cases. There is a lot more to know. Learn about it, here.

Now, this may sound strange… but don’t rush out to sign up for NeVir Spies right away, unless you have an urgent need. That’s because its about to get a whole lot better, thanks to my newest notion, now becoming a project in works… Web Walker:

Web Walker is a completely new and ultra low cost, fully wireless alternative to the Internet, itself, one which is ultra secure and private because it completely bypasses the ISP and telecommunications companies, and thereby, government. YOU become the ISP as well as the communications medium, in a very real way — and of course, you have no need of government involvement in that which you can legally undertake on your own. Even so, it remains compatible with, and is not intended (yet) as a complete replacement of the current Internet. Yet it affords a reliable replacement should the WWW be shut down or be compromised due to sabotage or natural disaster.

As an Open Source Project (OSP), it means free access — no ISP bill, though some nominal expenses can be involved in some cases for select users, and it can represent an income source for others, or the same select users. It does have some up front investment costs for some, but not all, because they might need to upgrade their equipment’s capability or perhaps have more of it if wishing to have more direct involvement.

That cost can be spread out among other users so as to seem negligible, which is where the nominal expenses and income are derived. As intended to be implemented, it will include NeVir Spies as an option, and do so in a considerably more economical fashion, and with a portion of the income going to offset select operational expenses to help keep Web Walker free to most users. In fact, some users will qualify for free NeVir Spies, and that’s why I’m not urging you to jump into NeVir Spies directly. However, it will be many months before Web Walker is available for general use by the public, so if your security need can’t wait… contact me now, anyway — especially since there will be ways to access Web Walker ahead of public availability in its testing and debugging phase. Guinea Pigs needed.

Web Walker, which will also need a new name, addresses EVERYTHING in this post one way or another, though it may not seem like it with superficial review. Its unique design will mean that even those users who might be deemed as system operators will not have access to the actual information transmitted (unlike an ISP or telecommunications system), and therefore, there will be no place for government to go with a warrant to access said information. It addresses all forms of spying and privacy concerns on the Web, especially political spying and targeting, and specifically addresses Internet 3.0 and the Kill Switch. Take a look at it.

If Hilary Clinton fears she and her governmental friends are loosing the (dis)information war (with citizens) because of the Internet, today, wait until they see what we can do when there is no way to use eavesdropping, tampering, or censorship to counteract it. Truth (the Pen) is mightier than Lies (the Sword). That’s Web Walker.

SPQR, PAX Amerikana: the Failing Roman Empire of the NWO


And why they must keep you afraid of (something) and distract you from the simple truth.

by H. Michael Sweeney
permission to reproduce granted if in full and with all links and credits in tact, and linking back to proparanoid.wordpress.com

SPQR, PAX Amerikana: the Failing Roman Empire of the NWO

SPQR. Design: Philippe Remacle.

SPQR. Design: Philippe Remacle. (Photo: Wikipedia)

At a root level, the United States governmental model is not that much different than that of the Roman Empire — especially today. Yes, I will be found to be generalizing in ways which take some liberties to make the point, but would hope the reader is intelligent enough to understand the reasoning for cause. Compare and consider:

• Both were/are based upon a Senate form of government (in Rome, they said ‘SPQR,’ which stands for Senätus Populusque Römänus — the Senate and People of Rome) headed by a supreme, all-powerful dictator with the ability to make his own laws regardless of basis in legality. We call them Executive Orders, they called them edicts from the Emperor who, in the declining years of the Empire, thought himself God. Hmm… you don’t suppose Obama…    ?

• Both were/are expansionist in nature based on superior military prowess applied in an endless series of wars to ‘insure peace.’ In Rome, they said ‘Pax Romana,’ which translates as ‘Roman Peace.’ For the Romans, conquest was early on territorial in nature and garnered slaves to build and maintain the Empire and establish a comfortable standard of living for citizens. For the U.S., early conquest was territorial in nature and garnered resources to do the same — over 140 military campaigns between 1776 and 1900, and more to come. Sure. Some were and would be righteous and just, but many were and would be contrived and questionable.

• In Rome, they declared neighboring peoples as ‘warlike’ and ‘barbarians’ to justify conflicts to subdue them. In America we declared the Indians and others in the same way, and even took land Canada had claimed by threat of war (54-40 or Fight!).

But it is the declining years where the similarities are more useful to the purpose of this missive, because America is clearly in decline, too. Let’s therefore go more slowly…

• Rome’s military was a fearsome beast which cost a lot to maintain, and which could easily overthrow the government if given a reason. For that cause, it was important to insure they were kept busy and constantly rewarded.  In America, the same is true. In point of fact, there was an early New World Order sponsored (the same powerful Fascist business elite as drive the NWO movement, today) attempt at a military Coup in 1934 which was thwarted largely by one man, Major General Smedley Buttler, USMC. More recently, four-star General Tommy Franks has stated that the next major terror event would result in a military form of government.

• Rome sponsored wars (‘Let loose the dogs of war!’) and allowed soldiers the reward of ‘Cry havoc!,’ a policy which let soldiers rape and pillage the conquered and keep a share in the spoils of war. In the U.S., the Military-Industrial-Intelligence-Media complex is rewarded by huge profits in the manufacture and sale of armaments and arms technology. The high ranking soldiers, themselves, reap their fortunes by taking seats on the Boards of Directors once they retire ‘with honors.’ Unlike the Roman military where one served until no longer able, most soldiers of today are short-term liabilities replaced every four years or so. Therefore, they reap no reward but that of medals for their valor, and perhaps a skill useful in seeking employment.

• In both cases, the taxes upon the people had/has become a great burden and the standard of living began to slip (brother, ain’t that the truth), and because money was harder to come by, less was spent in maintaining other important governmental responsibilities, the quality and operation of societal infrastructure began to decay, including the physical aspects made of stone, wood, and metal. That’s one reason why aspects of America’s transportation (bridges, mostly), water and sewer, and rail systems are in many cases on the verge of total collapse.

• In both cases, the people began to express dissatisfactions with high taxes and poor upkeep of civilization itself, and related woes, including the wars and the price of the military. Distraction was needed to keep the people happy. In Rome, they built coliseums and offered up gory gladiatorial massacres and theatrical entertainments. In America, they employed film and television technology to offer up unlimited access to pornography and artistic entertainments, and Grid Iron and other sports to replace bloodlust contests.

• And, in both cases, these distractions were not considered enough. The government saw that they needed to find a way to make the people see some outside threat as a greater threat than concerns over a failing governmental system. The only way power could be maintained was to instill a great fear, one so great as to justify a tighter Police State grip on the people. In Rome, it was the Huns of Germanic culture, and the Cicilian and Turkish Pirates of the Mediterranean. In truth, it was largely a non threat; the Huns couldn’t cross the the rivers and mountains which protected Rome, but the people weren’t told that.

Truth or Scare TV Show ‘poster’ (click)

In America, it has been a long list of like things… longer than you know (refer to this list of military actions which is from whence the counts are derived, herein):

a) In the 40’s and 50’s it was the Red Scare of McCarthyism and the Bomb which drove Nazi-style inquisitions and empowered Hoover and the FBI to become perhaps ten times as powerful as it had been before, and fostered the creation of CIA, the Department of Defense, the National Security Council, and the birth of mind control projects. We had WWII and Korea, and 24 other military actions. Television took root to keep us distracted with the likes of Lucile Ball, Bob Hope, Howdy Doody, the Mickey Mouse Club, and other mindless offerings (which I dearly miss).

b) In the 60’s and 70’s it was the Domino Theory and the Bomb (especially the Cuban Missile Crises), and ‘campus radicals’ which allowed the Military Industrial Complex to mushroom via Vietnam and 18 other military actions, plus a phony Drug War to allow CIA to profiteer, while at home the FBI and CIA ran COINTEL and COINTELPRO operations and gave us Watergate. We also learned about CIA’s infiltration and control of media via Operation Mockingbird, and how perversely they had sought after and employed mind control research. The Free Sex and drug culture kept many distracted, while the film industry began pumping out pornography to keep the less liberated distracted, and Television sold us consumerism for like cause on a scale no one would have thought possible. “Buy today, be happy (hold up box of soap next to smiling face)!”

c) In the 80’s and 90’s it was the ‘Evil Empire’ and off-shore and distant Dictators we had to fear, countered with an endless series of some 60 spats and more exotic entanglements like Iran Contra, Marcos, and Panama. The NSA made ECHELON a household word and we learned about FISA (actually a 1978 Act) secret courts that rubber stamped warrants to make political spying effectively legal — and trading of illegal political spy files by Police departments, CIA, and the Anti Defamation League/B’nai B’rith/Mossad (note: I was a victim of this!). It also brought us HAARP, the project born by a proposal ‘to control a billion minds’ by a Presidential Science advisor. Pornography escalated to video markets and strip bars are so commonplace that only live sex shows seem the unusual. But they’ve also learned they can distract us with news stories about celebrity sins such as skater knee whacking, football player knife slashing, and Royal weddings and the death of a Princess.

d) And that brings us to current history, where the idea of an endless war which can never be won was fostered; the terrorism ploy. Now this they are milking for all its worth. Police and Federal Agents are indoctrinated to the point of paranoia seeing ordinary acts as signs of terrorist behavior: you cannot take a photograph, pay for something with cash, write a school report or possess a bumper sticker which mentions Ron Paul, or cite the Constitution without being suspect of terrorism. You cannot go to the Airport (and soon, to a sporting event, theater, or public building) without being sexually molested by TSA. No remnant of the Constitution remains in tact, save perhaps the 2nd Amendment, which hangs on just enough to prevent total take over — the whole REASON it exists in the first place. And now pornography comes in over cable television, and live sex shows are becoming commonplace, and for the less prurient, reality television and the spread of lotteries and gaming casinos.

None of this makes real sense. Why should you fear a terrorist when excessive Police violence injures and kills more citizens in any given year than do terrorists in their best year (9-11 attack)? It is a bill of goods used to control you and keep you docile in order that the Military-Industrial-Intelligence-Media Complex can continue on its New World Order agenda, reaping in huge profits as they usurp more and more political control over you. They want us to fear terrorists. I say, let’s show them a form of terrorism they SHOULD fear; a free people who control their own government, as the Founding Fathers intended.

Unless you believe in and support PAX Amerikana, SPQR-style (are a Fascist), just say NO! Boycott the system at every level (be a financial terrorist): avoid banks, don’t use credit, buy used instead of new, repair instead of replace, refuse and resist GMO foods and grow your own, rely upon barter and cottage industry. Actually, there is an endless list of concerns similar to GMO. It would behoove you to learn about and resist conspiratorial NWO agenda projects like Codex AlimentariusAgenda 21Carbon Tax/Carbon Credits/Carbon Currency, United Nations Biospheres (and an endless array of other UN mandates), and the Canamex Highway and the North American Union via the Security and Prosperity Partnership.

Disobey government (be a political terrorist): insist on your Constitutional rights (for many of you, you must first LEARN what your rights actually are, especially with respect to dealings with Police and investigative agencies, and the court system) and go out of your way (be an activist) to do so; video Police (even if… especially if they pass a law against); employ civil disobedience and support Occupy and similar movements; write everybody in power and speak your mind; vote for no one who is not a Constitutionalist, a Libertarian, or an Independent (kill the Democratic and Republican Party Dog and Pony Show); write every media outlet to express your views and flood them with complaints over bias reporting, and write their advertisers threatening or actually seeking to boycott.

Please deem to review the 24 Planks post which attempts to highlight the changes needed in America to restore it to the strong and free country it once was. If you agree (or disagree) with any one of them, SO COMMENT on the page, tweet, share, reblog, and rate. THAT POWER is a right you should AT ALL TIMES exercise when you see something you like or dislike anywhere along these lines. How else will those who spy on us and those who (pretend to) serve us have good meter of our pulse and realize they had better back off a notch or two? If you do not express yourself, you have not learned the one simply truth: YOU are the one you’ve been waiting for to change what is wrong. Get busy, because they have an endless supply of Obamas and Romneys to take us further down that SPQR path to destruction.

Compare 1776 to 2012, and see where you really live, and decide if you are willing to accept that, or not.

Related articles

Proof Repeal of Posse Comitatus Will Establish Police State


A victim’s first-hand accounting of an actual illegal military assault on an American neighborhood with terror and abuse of rights

THIS IS INDEED A WARNING YOU SHOULD HEED!

Updated Feb. 21, 2013  Recent events cited below reveal the incident depicted here is currently being experienced wholesale fashion around the nation. There is little difference in neighborhood impact between the events described here and those which have been routinely put into action in major cities across America. And media tells us not. Local media, yes, but national media, almost always no. Ask yourself why that is, and then see if you think your news ‘fair and balanced,’ or if it more closely resembles the propaganda we always accused Russia of using in the Cold War era?
 
The only difference is that the current events are ‘military raids,’ not ‘police raids with military help,’ (some exceptions may exist) and the raids are not targeting individuals, but whole neighborhoods, and instead of having a warrant and a crime for which the warrant was approved, they have no warrant, and simply attack because they can. Fear and panic spread from the neighborhoods all the way to City and County officials, who in almost every instance were in no way warned or notified the attacks were to take place:
 
Helicopters swept in low between hi-rise office and apartment buildings, often discharging gattling guns, troops repelled to rooftops, streets, and parking lots, and went door-to-door through target buildings engaging in gun battles and tossing grenades as needed. Mock drills using blanks and flash-bang grenades, they claimed, but tell that to the citizens who, in some cases, grabbed their guns thinking they might need them any minute… to parents and teachers who feared for the lives of their kids as they put their schools into lockdown… to the city officials who’s 911 switchboards lit up and resulted in countless cars being dispatched, only to be repelled by armed soldiers.
 
The entire city thought war had broken out, or that Obama had decided to try to take the guns by force. And though neither was the case, that did not improve the safety of citizens at large. Any of those helicopters could have crashed, it being true that there are many such crashes in training exercises, as well as when on real missions. Anyone might have fired live rounds at the soldiers misunderstanding their purpose, including any illegal drug dealers unfortunate enough to be nearby. Anyone could have crashed their car in distraction, or had a heart attack in their panic. And for what? A practice at what? Raiding a U.S. city?
 

How dare the United States Military deem us a target, even in mock!

 
How is it they have the right to bear arms against us this way? The whole purpose of the second amendment is that we bear arms to protect ourselves against them, or a government gone mad and employing them against us. The military and White House has forgotten who they are, who we are, forgotten the Law of the Land, and thereby so dare. They have forgotten their oaths of Office each and every member has sworn, and  have moved forward the date and time when the second amendment will become our duty to defend by force of arms, thereby validating our Forefather’s concerns which drove its penning.  Shame on them for allowing it to happen.
 
This scenario played out in various forms in Chicago, Houston, Miami, Boston, Minneapolis, Los Angeles, and elsewhere. So as you read this review of a real raid where people were shot, consider carefully, for your city may be next. And, regardless of any foreknowledge that such raids exist and take place, you, too, will be forced to wonder: is this merely a drill, or is the government coming for the guns. Just another reason to fear your government, another reason to cower and let them get away with oppressive laws. Shame on you if you allow it to continue.
 
End update
 
There is no copyright or author to be concerned about citing as source associated with this article. I would appreciate any reproduction include all links in tact and point back to proparanoid.wordpress.com as it was I who obtained the material as part of my investigations and interviews with victims. The original author and his neighbors rightly feared for their safety (death threats had been delivered) and thus asked that I redact things which identify any who were not already named in news stories of the event. The material, which I have also included in my book set, Fatal Rebirth,  was prepared for use as a public notice and warning posted on doors of homes and public places in a Portland, Oregon, neighborhood in August, 1993:

military police state repeal of posse comitatus

Background and relevance to today’s militarization of Police methods:

This is almost exactly what businessman Johnny Senteno saw on a Portland Oregon neighborhood street seconds before being shot point-blank twice for the unpardonable offense of lighting a cigarette in front of his company truck. No one knows if it was Police or Oregon National Guard who shot him, as they dressed identically with no front-facing identification. Portland paid him $100,000 in a settlement.

(This introduction, and inserted notes are provided by me, author H. Michael Sweeney) In August of 1993 there had already been nearly two-dozen violations of the Posse Comitatus Act of 1878 taking place in various forms around America as the Bush Administration, through Secretary of Defense Dick Cheney, were testing to see what could be gotten away with with respect to Posse Comitatus. Most such events were singular violations of a given aspect of military use in Police actions, such as outlined briefly in another of my blog posts. This post will also reveal other forms of criminality used to fund black operations such as CIA drug running in America, and political graft.

In Portland, Oregon, the Chief of Police at the time was one Charles Moose, who had a background in Military Intelligence in the National Guard, and who was being groomed to be Police Chief in Washington, D.C., where crime was so rampant that the current Mayor was pushing for legalizing military use in Police actions in the city… and he would indeed get that post in time to be boosted to international attention as the Cop in charge of hunting down the D.C. Sniper, which this author feels was part and parcel of the DOD plan called Operation Northwoods, the blueprint for fomenting our false-flag war on terrorism. This is all documented in my book set, Fatal Rebirth.

Therefore, this ‘raid’ was a building-block tool for Chief Moose and quite tied in several ways to the ‘terrorist’ events to unfold on Sept. 11, 2001. More than this, it was a training exercise in general for the intended Police State future envisioned by the Bush/Clinton/Bush/Obama regime. I state it as a single regime because Bush programs aimed at achieving a Police State were continued and augmented under Clinton, and his under Bush, and his under Obama. It matters not who you vote for if in mainstream elections, they are all the same conspiratorial NWO players pretending to have varied political agenda worthy of providing distraction from their unified hidden agenda.

Posse Comitatus is not currently repealed. This is NOT a Police state under siege by revolutionaries… not quite yet. If and when that happens, government will have ONLY ITSELF to blame. Yet the government has taken steps to establish a de facto repeal to bypass the law (this Senate link details section 1031 of the National Defense Authorization Act signed by Mr. Obama, and there are other Acts and Executive orders which play to the matter). I fear it will eventually lead to armed rebellion if things get out of hand such as exemplified herein; if you allow our outlaw government to continue to ignore the Constitution and Bill of rights to undo Posse Comitatus, this is what you can look forward to on a regular basis… if not worse:

military police state repeal of posse comitatus

Public Notice and Warning (posted on neighborhood doors)

My name is [REDACTED], and I’ve been living here since 1967. A few months ago, the Police served a warrant on our house in what they said was a drug raid. Since we don’t use drugs we thought they had the wrong house — the people across the street were known Police informants and drug users, but they were not raided.

Even worse was how the warrant was served, and the aftermath. Part of it has to do with the fact that they used the National Guard in the raid — which I am told was done illegally, and in direct violation of a judge’s ruling. The cops dressed like soldiers but had permanently sewn Police patches, and the soldiers wore temporary strap-on license plates for Police markings — making it impossible to know who you were dealing with in the confusion — especially since they didn’t announce the raid or say they were cops. Everyone in the neighborhood at first thought war had broken out, since these Police markings were only visible on their backs.

Note: Chief Moose had already used the National Guard and military APC units in several Police matters in violation of Posse Comitatus. This had prompted a judge to issue a ruling in favor of The Posse comitatus Act of 1878 (which stipulates that the US military can-not be used in law enforcement duties except by declaration of Martial Law) — unless under direct order by the Governor under Martial Law.

Chief Moose continued in violation of the Court Order to cease and desist, citing ‘public safety concerns.’ But as you read this material, the reverse is shown to be true — the military put the public safety in greater danger. I wrote Governor Barbara Roberts about this and was given a copy of a ‘blanket authorization’ issued to Charles Moose (no Martial Law involved) to use National Guard… dated AFTER they had been used, and AFTER the judges order had been violated, but claimed to authorize the prior events, as well. Moose, by the way, several times on live TV agreed to meet with me for interview but in over a half dozen attempts to do so, I was informed he was ‘on vacation’ that day. So was the City Attorney, the Mayor, the Police Public Relations Officer, and anyone else I attempted to interview in his stead.

The first thing we knew, soldiers burst into our bedroom and pulled us naked from our bed. Instead of identifying themselves or why they were there, they only cursed and called us foul names, telling us to shut up. They forced us to cower nude for a good part of an hour, not letting us ask even for our clothes or covers. Eventually, they told us they had a warrant, but they also made lewd comments about my wife’s nudity as if trying to provoke me to fight. I worried it was to justify shooting me, and held firm.

They repeatedly ran a drug dog onto the waterbed, records and electronics, and delicate items on shelving, running him back and forth to maximize damage. They trashed the house so bad you couldn’t even walk through some rooms from the overturned furniture. Even though they had access to the whole house and keys to all doors, they continued to smash windows and locks. They threw birth certificates and personal papers into the wet sink and trash, and spilled solvents and paints on expensive automotive manuals for my work. They took live ammunition out of its box, took it outside the building, and threw it into deep grass. I hate to think what could have happened if I had mowed the lawn without noticing.

They found no drugs, but they opened and took mail. They took cash from a recently cashed pay check, and an uncashed check from a relative. They took all sorts of contractual documents about our finances, as well as property titles and all of our personal ID. They didn’t even offer us a receipt. When I later tried to get our things back, they said I had to obtain a notarized statement which, because they had our ID, was impossible. When I pointed this out, they just laughed at me and said, ‘Tough luck.’

But that’s still not the worst. In serving the warrant, the soldiers surrounded the entire neighborhood and went into yards everywhere, also arriving in an armored personnel carrier and with an Army helicopter overhead. They shot my dog in the eye and fired shots over the head of a woman opening her back door to see why a neighbor child had burst into her house screaming in fear. They also fired shots at a neighbor who was simply walking in the street, and forced him to the ground and cuffed him. Another neighbor, his wife, and an infant where held at gunpoint on their own porch while their property was illegally searched — they were not listed on the warrant.

A Hispanic businessman standing by his truck with both hands already raised to light his smoke was shot twice without a word of warning. When he asked for help, they shouted racial slurs, and told him to shut up as they cuffed him. Everything described so far took place before the Police drove up to announce “Police” and “warrant.” No one mentioned thus far, except for our home, was listed on the warrant or even near property on the warrant.

Few heard the announcement of “Police” or “warrant” because of the noise from the Army helicopter and Armored tank-like vehicle. Despite many witnesses, Police denied shootings took place. It was later discovered they had used a new kind of “non-lethal” gun outlawed in Europe by every major law enforcement agency as being too dangerous for general use.

Note: The businessman, Johnny Senteno, eventually won a $100K cash settlement against Portland Police for the shooting, which was proven in court to have taken place. In my investigation, the head of the SWAT Team involved first agreed to speak with me but terminated the interview when I raised the point about the weapon involved, which fired a dense compressed pepper-spray-based compound intended to ‘disintegrate’ on impact to engulf one with pepper spray at distance. However, fired at near point-blank range, they fractured bones and left bruises which took weeks to heal.

Many people, including several bystanders having nothing to do with the raid, and a pregnant woman, were cuffed and held at gunpoint for hours but never arrested or told why they were being held. Only after the TV crews had left, were these people released. They were instead warned to “keep quiet about this” if they didn’t want any “future problems.”

Cops told media our neighborhood was a drug haven where you could get anything you want, but several independent investigators say only a Police informant ignored by the raid was ever seen dealing. One private investigator made several connections between the raid and the murder of Anthony Duane Shaw by Police — thought to be blackmailing dirty cops, as was the other person named on the raid warrant. One connection led to my house, and two to the other house raided.

Note: Myself and at least four independent filmmakers and radio or cable TV show producers spent an estimated 400 hours between us investigating the matter, resulting in more than 12 hours of radio and TV presentations. This was on the heels of a like investigation of Shaw being shot 13 times by Police (his family won a $100K wrongful death award). My part was the least of the effort, but my methods allowed me to get closer to the identity of background players and their motives, uncovering profitable leads resulting in the more interesting discoveries.

Their experience was much like ours, but there, Cops took even stranger stuff — a guitar, a video tape of an episode of a real-life Cops TV show, and absolutely everything in the yard and a garage which they promptly declared as junk and a nuisance — even though the items in the garage were neatly boxed. This was true because the occupants had just moved in — those named on the warrant no longer lived there. This was done outside of due process, and investigators believe it was not taken to the dump, but rather to a convenient place for detailed search conducted out of the eyes of all authority.

But the Police did make an arrest — despite admitting to the press that no drugs were found. In fact, they left some rooms unsearched, almost as if they had found what they were really looking for. They later said one marijuana joint was found. This was then changed to drug distribution on court documents, but by the time they went to court, it had become drug manufacturing. The person charged was the fellow with connections to Shaw, and who, like Shaw, had himself claimed to be blackmailing dirty cops to leave them out of their drug dealing. He was railroaded. He was such a dangerous felon, by the way, that he turned himself in when he learned of the raid on the news, driving back to Portland from out of town to do it.

Note: All charges were eventually dropped since there really had been no discoveries made in the raid. The entire matter seems to have been orchestrated to obtain blackmail evidence against bad cops and sanctioned CIA drug smuggling operations, a matter in which I would later witness first hand a known CIA front’s involvement.

They later did much the same to my wife, eventually arresting and prosecuting her on minor charges equally false: after the raid they followed us everywhere we went, even into restaurants; they repeatedly made awful, insulting comments in public about us; they stopped us for phony traffic violations all the time, illegally searching our car without probable cause; they eventually planted and “found” a small quantity of drugs in the car.

Should you not believe that, consider how likely you would be to carry drugs in your car knowing the Police continually followed and stopped you, and searched your car. Unbelievably, at least one person on the jury turned out to be connected to participants in the raid by virtue of real estate deals mentioned below. The State-provided lawyer did not protest an obviously rigged jury once notified, nor did he provide good defense in court, hardly opening his mouth unless the Judge spoke to him.

Note: These matters were heating up on Public TV cable shows and though the woman was found ‘guilty,’ before sentencing could take place, the matter started to unravel;  Maj. General Gene Katke, head of the Oregon National Guard resigned his post amid an investigation described as regarding financial mismanagement. I was subsequently told the Judge declined to sentence her to jail time and instead elected community service/probation.

Another thing uncovered in private investigation is that the raid, continual Police harassment after the raid, and perhaps even the reason behind the murder — had to do with some sort of land grab by a mysterious series of dummy corporations operated by law enforcement and government officials involved in the raid. Someone representing [REDACTED] Mortgage offered us half of market value for our house “so we could walk away from all the trouble.” He told me that “powerful law enforcement and government people were in the company,” so I “should sell to them if I didn’t want any more trouble.”

I also know there are direct ties between this man, the Police, and between the company and the houses where the raid and harassment took place — where the families recently moved out after things got too scary. Men shattered the windows and beat one of the tenants with baseball bats, and threatened them with shotguns — the one who did the beating was a cop named [REDACTED] who, despite being from another county, was also involved in the raid.

Note: that cop eventually tracked me down because of my investigation of this aspect of the matter, and took action; he approached me with a gun in a folded newspaper while I napped during my lunch hour in my car at work one day. But my Guardian Angel woke me and I saw him in the rearview, and quickly exited to face him. Seeing the gun and the look on his face, I motioned with my head to inform him I had been (deliberately) parked under our companies security camera. He did an about face and I had no more trouble with him.

He wound up being the new landlord, suddenly owning a large number of houses in the area. He only accepts cash for his rent, refuses to give receipts, and will not sign a lease or rental agreement. He continually evicts people suddenly in the middle of the night by ‘Police orders’ and then keeps all their possessions they were unable to take with them. If anyone complains or takes legal actions, they get the same treatment we got.

The neighborhood continues to be harassed. Cops follow and stop most of us who have not yet sold our homes, drive by at all hours shining lights in windows, or they just sit and endlessly watch. They make us afraid to go outside. Some neighbors have been beaten by Police, had threats of arrest “to teach you a lesson,” and even threats of death. After beating one man in his front yard for mouthing back at the cops, they dragged his wife by her hair on the gravel roadway while she was wearing only a bathing suit — all in front of their kids. Despite the beating and the rough treatment, they made no arrests — underscoring that it was not “in the line of duty” or because they “resisted arrest,” though they were threatened with jail time.

Our house has been bugged, confirmed by the fact that arguments between me and my wife were being picked up on neighborhood short-wave radios, and covert entry was made to leave things, probably planted evidence for the next time. I’ve only told you a small part of the problem — I could go on for pages. Something is very wrong, and we worry that they will do something even worse. We have been tipped by friends close to Police sources to expect another raid, soon.

We are very afraid. Someone needs to expose what’s going on. Even though my wife and I have never had a history of problems with Police, they are now there every time we turn around. Our Police files were nonexistent before the raid, but now, they are inches thick with all the Police reports executed through the many harassment efforts. Not one entry has been legitimately made, but they make sure there are never witnesses, so we can’t prove it or file charges.

Rush Limbaugh mentioned the illegal use of the Guard on his show, but he didn’t know about the rest. You do, so be careful. If they want my house, they might want yours, too, since you are my neighbor. The cop has gotten at least seven houses in the neighborhood so far. You might be next…

End of original material

military police state repeal of posse comitatus

Summary Notes

I eventually managed to speak to the man representing the Mortgage company and learned that he himself was coerced and beaten (lost two front teeth) if refusing to help, and NOT an employee of the firm. He was, in fact, the ‘Police drug informant’ beaten with bats. When he did what he was told, he said, he was provided with drugs as reward.

He indicated that Governors of at least two states (he mentioned Arizona, California), city officials, and various law enforcement people had set up a company to purchase properties as silent partners (illegally concealing their identities). He told me houses were painted in a particular combinations of various two-tone colors to indicate who ‘owned’ and got the income from a given acquired property. Indeed, I found more than two dozen homes in the greater neighborhood with these identical paint combinations, in under thirty minutes time.

He also provided me with a copy of an ad used to secure renters for the homes. It had a phone number which went directly to Clackamas County Corrections, the very place where I had already identified a CIA asset working as a corrections officer, along with several bounty hunters trained at a CIA school in California. The phone number was an answering machine which simply asked you to leave your own phone number. I left mine, and it was shortly after that that I was visited by the Sheriff with the gun in a newspaper.

I later followed up with the Mortgage company and clues there led me to a CIA front involved in each transaction. That investigation led to discovery of a murder in the State Capital which seemed to be tied to acquisition of businesses in like manner as the homes. The more public the affair became on Public Access TV, the more things began to unravel, and the hotter it got.

There were more attempts on my life, including a ‘traffic stop for a burned out tail light’ by no fewer than nine local, county, state, and federal cars. Fortunately, my Wife was driving in her car with me, and stopped, thwarting what was presumed to be an intended replay of the referenced broad daylight murder of Shaw by a similar stop. Unarmed, he was shot to death by nine officers as he sat in his car with both hands on his steering wheel as commanded. He had allegedly tried to run down a Police officer between his car and one of the two cop cars which were literally bumper to bumper with his (their story), which conflicted with eye witness statements.

Before it was over, not only had the General resigned, but also, but the elected Clackamas County Sheriff Ris Bradshaw. The CIA fronts went under ground, and $12M worth of ‘confiscated homes’ were sold by the city to fund Police operations. I sent a letter of inquiry to Governor Evan Mecham of Arizona, and he also resigned that same month after being convicted on unrelated felony charges before that lead could be pursued. Naturally, there was no response to my inquiry.

I was just a citizen acting as a investigative writer for my book (Fatal Rebirth) on abuse of power issues. Don’t let anyone tell you a single individual cannot stand against the machine and make a difference by speaking out — and especially by joining with others of like mind. One General, one Sheriff, one Governor resigned, CIA fronts shut down, stolen houses converted from graft to public revenue, and more… thanks to our efforts to get at and tell the truth. Yes, it was risky, but why live a life in fear of living it to the fullest of potential? If they can cower you that way, you are not as free as they wish you to believe.

What of Early, of Late?


How vastly different life turns out for one friend compared the next… and yet how much so alike as to be frightening


Copyright (c) 1996 by H. Michael Sweeney — All Rights Reserved
Permission to reproduce for non profit use granted provided it is reproduced in full and links back to proparanoid.wordpress.com. This article was written for the Oregonian, but the Editor notified me that they no longer wanted my Op-Ed submissions because they generated too many responses critical of government. So I added the Oregonian stings and published it instead in my book set, Fatal Rebirth.

posse comitatus act posse comitatus group gun control

From the local news: A Portland man was arrested today for shooting two State Troopers in the back after being stopped for a traffic infraction. Neither officer was seriously wounded, thanks to bullet proof vests. Arrested at the scene on charges of attempted murder was Phil Early, of Portland, Oregon…

As it happens with many news stories, there is more to the story than meets the eye. Sometimes, there is a story behind the story.

I knew Phil Early in a more innocent time. I knew him as well as anyone, both teenagers attending Jefferson High School. He was a very different person then, certainly exhibiting no characteristic that might lead to his shooting a female State Trooper and young man wearing a State Trooper uniform* in the back. His worst offenses in those school days were being suspended for playing hooky.

Having lost track of Phil after I went into the military, and having often thought about him over the years and the many good experiences we had shared together, I must wonder what could have brought him to this unlikely end. Having heard that he had joined the Army and was killed in Vietnam, it is a shame that it took this tragic news event to reveal the error in that information and open the possibility of our meeting again. Perhaps, under the right circumstances, I might even have made a difference in his fate. This haunts me.

posse comitatus act posse comitatus group gun control

But that is not all that haunts

Despite the outwardly heinous act and the many negative stories of Phil in the local media, there still seems much good about Phil in tact from when I knew him. He still is a caring and giving person, according to those who knew and worked with him in his last days as a free man. It is said that he helped anyone who asked and gave of himself freely, without judgment. I even understand that he had fallen victim to con artists who took advantage of his giving nature, but he had not let their greed dim his caring for or trusting of other strangers in need.

This was the Phil I knew, who would volunteer to loan his best blazer to a casual acquaintance (I had known him all of fifteen minutes when he offered it to me), or a Phil who would give his last two bucks for gas to a stranger stuck in front of the local grocery store. And that memory does not tally with the news reports of a man who supposedly, by association with Posse comitatus, has a hatred for other races. The stranger he had helped to buy gas in the early 60’s was a black man. In those times, equality was a mere dream in Martin Luther’s sermons, but already reality in Phil’s heart.

And speaking of Posse comitatus, I try not to automatically think harshly at the sounding of the name. It was the Posse comitatus Act of 1864 which protects citizens from abusive application of military against civilians in police actions, unless under martial law. This, perhaps, is why the current group by that same name does not recognize the State Police as a duly authorized Police agency.

Rather, they feel that any armed force under direct authority of State rule, regardless of the name it uses, regardless of the document of law or charter which empowers it, and regardless of its stated mission or rules of procedure, is nothing more than a state militia — a military body. As such, just like the National Guard, it is seen as a military unit subject to the Posse comitatus Act.

It was originally reported that Phil, like many Posse members, had an arsenal of weapons and ammunition. The Posse apparently believes, like many groups, that it is up to the citizens to protect themselves from the possibility of a military overthrow of the government — a thinking which, in exercise, requires a well armed and well trained civilian population. I now understand that Phil’s arsenal has turned out to be closer to the number of guns owned by the average farming family in Kansas. The description of many of these weapons apparently better matches that of “collector items” than of “arsenal.” This is closer to the Phil I remember, who liked to collect a variety of many like things, as would please his eye. In blazer’s for instance, he had nearly a dozen. He had many fewer guns.

There is one disturbing thought, however. As different as our lives must have been, and as different as our current situations seem, there is much about Phil’s late history that matches my own life. I, too, have grown suspicious of many in law enforcement, and have had my share of confrontations with them, including multiple attempts on my life by assassination.

Phil’s negative experiences might be deemed politically shaped by Posse comitatus. Mine have been as a result of investigating illegal activities of those within law enforcement — coincidentally involving illegal application of National Guard and other Federal agencies by or within police — the very thing feared by Posse comitatus.

posse comitatus act posse comitatus group gun control

The nature of fate?

In realizing this commonality, I ask what might bring us so tenuously close in our thinking and experiences, despite the many years and miles between us? I go back to the innocent times, and a possible answer seems apparent. It was the time of Camelot. We, the youth of the nation, had a man in the White House we could love and look up to, regardless of any political realities perceived by our elders. And then, he was gone, taken away in violence under questionable circumstances.

I remember well the weighty discussions with my peers at the time, including Phil, of course. Even then, the theories were abundant. As more was learned, the doubts grew about the lone gunman theory. Perhaps this dashed our innocence and planted a seed of mistrust of an armed government and its secret minions of intelligencia – a mistrust which ultimately led us each along separate but similar paths, once we parted ways at the end of high school.

Now of course, there are more facts pointing to CIA assassination than to Oswald. Despite CIA Operative testimony under oath in court that CIA was directly involved in the murder and a cover up, which necessarily and demonstrably began before the murder, media still chooses to label anyone who questions such things as “conspiracy buffs” — despite the fact that major media was present in the court at the time to hear that critical testimony.

That the CIA-Operative witness had, within weeks of the assassination, come forward to FBI with the same material, and later, also testified to the Warren Commission — and all ignored the truth, does not make us “conspiracy buffs” feel any better about media or government. Apparently media prefers to continue to publish fiction as fact rather than admitting they were blinded to the truth from day one. Perhaps government simply finds cover up the only acceptable way of life.

Come to think of it, local media and government did the same with local murders undertaken by Portland Police. Despite abundant witnesses to the contrary, media blithely published verbatim as fact, Police accounts of the shooting of a young man named Shaw — an event which I have researched to conclusions contrary to their version of the story, as documented elsewhere. There was a similar conspiracy of silence with respect to the 104th and Liebe Street Raid.

There, National Guard, including a helicopter and an Armored Personnel Carrier (APC), was illegally used in an alleged drug raid, but this author has discovered was more likely connected to the murder of Shaw. Local TV station KATU was the only station covering the raid, a matter itself perhaps telling since their former anchorman was also a former Police Commissioner and current City Councilman. Civic-minded KATU edited in new questions to field interviews of the neighbors of Liebe Street, in effect reversing their answers to make them sound supportive of Police actions, instead of condemning… everyone on Liebe Street was outraged at Police, the Guard, and KATU, but media would not air their grievances, nor would any government agency.

Surely, this angered the Posse. It angered many people, especially because of the abuse of power exhibited by Police. That summer saw Portland host the Guns and Hoses Olympics, where police and firemen from around the nation came to visit. With competitions in sniper shooting and police dog attacks, there was also likely an effort to show off Portland as a modern and well-equipped Police Department. Perhaps, but some would point to statistics to show it one of the more deadly departments, with the best way to die of gunfire by Police was to call 911 and threaten to kill yourself. They usually finished the job that those less dedicated to the deed could not. Perhaps it was such things, both old and new, that drove Phil’s anger.

Perhaps there are many from my generation who cannot let go of our misgivings and outrage from such things as the murder and cover up of our President by our own government agents. Perhaps there are many who, at least secretly within, believe in their heart that that terrible act in Dallas was the first of many dark chapters — chapters sufficiently dark to suggest a fearsome future at the hands of their authors.

That we see and deal with seemingly endless supply of similar Federal abuses and lesser version on a more local scale, does not help. Some of our generation are moved to action, while others prefer the safety of quiet contemplation. For those of us moved to act, some choose the pen, as have I, and some of us choose the gun, as apparently did Phil. Phil himself deeply regrets his actions, which he says were driven by the dominating and abusive attitude of the officer. Something, he says, just snapped within him.

posse comitatus act posse comitatus group gun control

How do we judge such matters?

I cannot condone what Phil as apparently done. I can, perhaps, understand its root cause. Society must condemn his actions. In friendship, however, I am moved to point out that this is not a simple case of gun violence, as many in media have promoted with gusto. Indeed, there is no such thing. Gun violence is not a living thing which happens of its own volition. Gun violence is the result of a given set of life experiences and circumstances. In fact, those things would conspire to vent violent action even in the absence of a gun — such as stabbings or other assaults.

Those that believe the guns are the evil root should therefore also seek to take away all the knives, baseball bats, pillows with which to smother, stockings and ties with which to strangle, etc. Each case of gun violence deserves some degree of calm analysis towards possible prevention of future shootings — not a knee jerk call for seizure of arms. In analysis of Phil’s case, I suggest his actions were driven by something which those very actions themselves could not possibly well serve.

Could Phil have thought through the emotions that drove the instant, and looked beyond in some considered philosophical light, he might have come to the same conclusion. I would suggest to Phil that his enemy was not present when he opened fire. It was not present in the persons he shot, except perhaps by some misapplication of mere symbolism. They were most likely doing a tough job in a just cause. Nor was his enemy their leaders or those that worked to create agencies so troublesome to the Posse.

No, not these things, but far less tangible things. An unhappy history with no suitable answers of blame. A docile public apathy with unconscionable surrender of power to an increasingly errant and abusive government. A growing frustration with no means of proper release. A gradual loss of freedoms to a New World Order. A reasonable fear allowed unreasonable control.

Looking back, and talking to others, I wonder: how many of my generation have traveled so perilously close to Phil’s path? How many more of us are near the line he has crossed? Too many, I fear. A legacy, perhaps, of Dallas? A signpost, perhaps, of our future path?

~~~

posse comitatus act posse comitatus group gun control

* The second person shot was, of all things, an Explorer Scout.

Under some extremely inappropriate reasoning, the State of Oregon and the Boy Scouts of America have decided that it is appropriate to dress Explorer Scouts in full State Police uniforms, sans weapons, and put them on the streets and in patrol cars — on the front line against crime, unarmed, untrained, and often, unsupervised.

This deserves another article of its own, as yet another example of the growing Police State in Portland, Oregon. Here, in Portland, highway workers, Explorer Scouts, firemen, private security firms, the National Guard, and even gang members, have all been inducted into the general law enforcement umbrella in one way or the other. One has to ask, why?

I only wish that Phil had thought to ask such questions first, and not have shot, at all.

 

25 Questions No One Has Asked About Aurora Shooting (pt. 2)


You can always spot a conspiracy at work… was james holmes a patsy by DOD or CIA? whenever you see evidence of a cover up in play

Our review continues from PART I, by H. Michael Sweeney, Copyright © 2012 all rights reserved. No reproduction permissions will be granted for the first 90 days. Links only, please.

In review: This in-depth series of posts will reveal startling new investigative issues for the first time, anywhere. The detail required to make concise arguments on a long list of critical elements forces it to be offered in installments. You may wish to subscribe to be sure you do not miss one along the way. Doing so, you will discover:

  • Three motives for making James Holmes a Patsy with Fascism as benefactor, and two possible motives for targeting Century Theaters
  • Easy link access to the key-most videos and images for each critical point of evidence presented in a logical, easy to follow order.
  • Reasoning there were at least three additional helpers involved in a professional black operation backed up by even more supporting players
  • Introduction of an actual political REASON for targeting The Dark Knight Rises (TDKR), a reason which fits one of the proposed motives
  • 25 key questions missed by almost everyone, the answer to any one of which could easily provide reasonable doubt that it was a lone gunman event
  • A walk-through narrative portraying an alternate scenario which fits all  conflicting facts into a workable reality.

James Holmes was a patsy Part Two

James Holmes was a patsy

 second gas mask and gun in aurora prove holmes a patsy

If you missed part one, click here

QUESTION 8: Who warned people not to use the EXIT in theater 8, and why? Tim McGrath mentions it, and I’ve seen but lost track of one other witness who confirmed the same point. Tim says the people in 8 were panicking and trying to leave. Toward the end of the clip he states someone entered the theater from the Lobby area and warned everyone not to go outside because the shooter was outside. Excuse me? How would they know this? If there was, WHO was it, because according to this witness, shooting was still going on in theater 9? Could this be misinterpretation or misunderstanding? I’d be open to the suggest except that it also happened in theater 10…

QUESTION 9: Who warned people not to use the EXIT in theater 10, and why? At 2:50 AM Channel 9 coverage has a witness from (by deduction) theater 10 who describes events while the shooting was going on in theater 9.  We really need to pin down if it was theater 10, so here is the deductive logic thread: Someone came into the theater from the left entrance, and warned them not to go outside, again while shooting was still taking place. Theater 9 would be to the left of theater 10, and theater 7 would be the left of theater 8. It would not be logical to presume someone further away from events (nearer to theater 7) to either be criminally involved or otherwise inclined or able to perceive a need for a warning. Any such person would need be closer, so it had to be theater 10. So again, who and why… would someone issue a warning without basis for such knowledge?

QUESTION 10: Why were bullets going through the walls into both theater 8 and 10? A look at the theater diagram from the Denver Post reveals that it would be logical for some rounds to pass through into 8, but there are only two ways it could have happened in theater 10. Either there was a second shooter unseen because people were attempting to hide or flee with their backs to the screen, or James deliberately turned his weapon on the wall. It is also possible any second shooter went behind the screen to appear in the dark on the far side, making them hard to see, but only if they used a silencer to completely suppress flash. This would create a distinctive sound witnesses did not report, as far as we know. Only in a cross fire situation should bullets logically enter 10, as shooting the wall is illogical. Why would James waste rounds to shoot the wall, especially since his shooting spree was ended prematurely when his gun jammed? Has anyone counted the bullet holes and compared to the half-empty magazine?

QUESTION 11: Who wore the second gas mask and used the second rifle found behind the theater? We have multiple Police statements which confirm James was found in his car and had with him in his car, a gas mask, and three guns: an AR-15 rifle, a Remington 870 shotgun, and a Glock handgun, with a second handgun and the high-capacity drum canister for the AR-15 discarded inside the theater.

Yet we have photographic evidence, Police radio traffic (18 minutes in), and additional statements to the press which prove a second mask and weapon were found lying on the ground behind the theater. The gun was at the threshold of the EXIT door, and the gas mask was found all the way at the end of the building, some 150 feet away from the EXIT and Jame’s car, where ‘the shooter’ is first reported being seen. The gas mask is part of a whole other series of questions which are the most troubling, of all. So why did James bring but not use two rifles, and two gas masks? And why does that weapon show a standard magazine (the light gray forward appendage). We were led to believe he quit shooting because his drum magazine jammed (which he left inside). Curious, as I would have thought the gun would be sans clip of any kind.

2nd gun with standard clip, girls shoes at outer exit leading to theater 9 & 10
2nd gas mask at far corner of building well away from where James waited

QUESTION 12: Why did the shooter not shoot the first and most logical victim? Jennifer Seeger clearly describes on ABC, a rifle being the first gun used to shoot into the air, and then it was leveled at her, but the shooter paused and did not shoot. She dropped to the ground and he instead opened fire on the crowd behind her. The clues to the answer as to why may lay in the next few questions.

QUESTION 13: Why does one witness says the first gun used was a rifle, and another a shotgun? We know he had both a Remington 870 shotgun and an AR-15 rifle with him. Both witnesses state the gun used was aimed directly at them, and both were within a couple of yard’s distance of the shooter and near to each other, and both took cover quickly. There are several other questions regarding these accounts, but the bottom line is that there is both a visual difference in the appearance of such weapons, and a stark difference between them their sound when fired. It is inconceivable that one can misidentify a shotgun as a rifle some mere feet away, especially once fired. Does the 870 shown at right look like a rifle, to you? Does the rifle look like a shotgun?

Which is which? Is it that hard to tell? What about the sound difference?

We have already examined Jenifer Seegar’s account. Here is the shotgun account by witness, Pierce O’Farrell, in a Channel 9 report, In point of fact, he was immediately shot at and wounded by shotgun, twice — once before being able to gain cover, and the second while he lay low.  All witnesses seem quite believable taken on their own, but I find a shooting victim with medical treatment confirming their story more credible than someone unscathed. Why two distinctly different accounts? Again, other questions may hold the answers…

QUESTION 14: Why did several witnesses stick around for more than a day and well into the night and even the next day after the shooting to be interviewed endlessly by local and national media, to include multiple appearances on a given media outlet? I raise this question because they both tended to use the same individualized phrases and hand gestures over and over, and both emphasize a lone gunman. In some cases, the cameras seem rather far back to insure we see the gestures. In fact, one of them goes overboard in his efforts, consistently waxing emotional to the point of tears. More to the point, the conflicting facts cited above play into the matter, and may be why more than one ‘conspiracy theorist’ has suggested these are paid actors intending to Wag-the-Dog.

Here is the man, Chris Ramos, on CNN. This is him on ABC. The others are Jenifer Seegar and her friend from the ‘rifle’ account just spoken of. She is seen here on ABC, and here on CNN. Her companion who frequently appears with her but who hardly speaks, becomes a kind of ‘silent confirmation’ to cement the reality of her statements. If these habitual appearances are not a Wag-the-Dog plot element, I’d like to know what they really are? Seegar’s not being shot and not knowing which weapon first was used suggests she was not actually present — but if that’s true, then the only way she could have known about the first shot being in the air would be if she was a participant with prior knowledge of the plan. There are yet other clues of Wag-the-Dog forces in play, as seen next.

QUESTION 15: How did CNN’s Wolf Blitzer manage to so quickly have available a slick 3-D computer-rendered, fully touch-screen interactive replay of the crime, and why was it altered between airings? His show, some 12 hours after the shooting, but only a few hours after witness accounts and Police statements useful for the purpose were known, provided the most comprehensive report yet available, and put EVERYTHING from the OFFICIAL  STORY into clear context. Find it here, the third video down in the group of smaller videos toward page bottom. How did they mange to have this super sophisticated technology ready to go so quickly, unless prepared in advance?

I am additionally concerned because subsequent use of the same presentation in a later program is altered. The first presentation shows only James’ entry via the EXIT and the aftermath (e.g., the kicking in the door first impression). The second shows someone going to the EXIT from within the theater to the EXIT door, depicting them LEAVING, which NO WITNESS HAS DESCRIBED, followed shortly by the shooter’s entrance (as if not expecting someone would end up recounting the man opening the door, and thus it does NOT show him returning from the door, but vanishing). Witnesses specifically describe the man from inside as NOT leaving the theater by the EXIT and a significant delay before the shooter arrives.

You see the altered version here at one minute into the CNN video.  This change took place after challenges to the ‘kick the door’ claims were taking hold on the Web, perhaps best exemplified by Alex Jones’ special report to that end earlier in the day. Yet the witness reports about the man opening the door (and NOT leaving) were known to media before even the first airing. Why was it not included in the first place if not Wag-the-Dog? Why was it subsequently altered to an INCORRECT depiction, later? Yet one more possible clue follows…

Was Aurora shooting a DOD or CIA operation?

The next installment asks these important questions:

James Holmes • How did CBS News know to describe ‘buckets of ammunition’ before anyone had seen inside Jame’s apartment?
James Holmes • Why did the shoot try to get into theater 10 after leaving 9 when his gun was jammed?
James Holmes • Why was James so calm when arrested when the official reason is impossible?
James Holmes • Why did James allegedly mail his attack plan to arrive well before the attack?
James Holmes • Why did his Psychiatrist call Police when it was not delivered to insure they found it anyway? 
James Holmes • Why was almost everyone in James’ life connected directly or indirectly with Mind Control technology?
James Holmes • And more…
 
PLEASE: Comment (page bottom, or contact me), Rate (at page top), Share/Tweet this article. Visit my Reader Forum to promote your own cause or URL. 
Related articles

25 Questions No One Has Asked About Aurora Shooting


Answering them reveals there was no lone gunman

A careful in-depth review by an author who specializes in crimes of the NWO and Intelligence Community, to include MC, by H. Michael Sweeney, Copyright © 2012 all rights reserved. No reproduction permissions will be granted for the first 90 days. Links only, please.

This in-depth article will reveal dozens of startling new investigative issues for the first time, anywhere. The detail required to make concise arguments on a long list of critical elements forces it to be offered in installments. You may wish to subscribe to be sure you do not miss one along the way. Doing so, you will discover:

  • Three motives for making James Holmes a Patsy with Fascism as benefactor, and a possible motive for targeting Century Theaters
  • Easy link access to the key-most videos and images for each critical point of evidence presented in a logical, easy to follow order.
  • Reasoning there were at least three additional helpers involved in a professional black operation backed up by even more supporting players
  • Introduction of an actual political REASON for targeting The Dark Knight Rises (TDKR), a reason which supports one of the proposed motives for choosing James Holmes as Patsy
  • 25 key questions missed by almost everyone, the answer to any one of which could easily provide reasonable doubt that it was a lone gunman event, or that James even pulled a trigger
  • A walk-through narrative portraying an alternate scenario which fits all  conflicting facts into a workable reality.

 James Holmes was a patsy Part One 

James Holmes was a patsy

Introduction: my credentials and methods

me

H. Michael Sweeney

The reader, if to have confidence in my commentary, should know my credentials. I write this as an author of seven books (proparanoidpress.com) generally upon topics which relate directly in any analysis of the matters in Aurora. That includes the topic of Political Control Technology (PCT — mind control), which mainstream media and government still refuses to acknowledge as a real and valid topic. This they do despite the blatantly available facts which abound, even to include evidence uncovered by Congressional Investigation. My full bio is available here.

But before we get into the meat of these matters, I want you to please stop and see this one video which is by far the most emotional and heart tugging (in a good way) of witness accounts: Jamie Rohre, telling how he and his family were under fire, and the frantic events and steps taken while worrying about his infants and their Mother from whom he had become separated. They were apparently not married, but the interview reveals that once reunited in the hospital, he immediately proposed, and she accepted. WORTH A WATCH. Good can overcome tragedy when you let it.

James Holmes was a patsy

Motives and Political Hay vs. Justice

I would hope my feeble efforts would raise serious questions for not just citizens, but also in the minds of officials; questions which a moral person should rightly feel in clear need of answering if justice is to be served. Questions which might lead any legal defense team working for James to a useful defense proving him innocent. Unfortunately, I have no reason to believe that is the goal of either the Court or the Police in this matter, and suspect any defense will be guaranteed to be marginal, at best. As common in all prior mass shooting events, assassination plots, and terrorist events, political hay is more important than a statue of a blindfolded lady, or her set of scales.

Motive 1: The most popular motive talked about the Web is the most obvious; the ‘trade your rights for security’ myth, a key step in order to allow a tighter Police State grip on the people. The hay in mass shootings and assassination plots is gun control, which is the key-most step on the way toward a Police State, and the only way it could long survive or even come to power in America. The proof of these remarks is perhaps easiest to illustrate by the ‘coincidence’ that in every shooting or terror event, Congress just happens to have in hand legislation ready for quick approval (but not reading or due debate) which provides a good deal of such hay for their New World Order horses.

In Aurora, it would be found in three forms, the first of which was, rather than a new law, a need to discuss the United Nations Treaty on Small Arms. Constitutionalists and gun owners fear the Treaty would force the 2nd Amendment to be repealed and guns to be confiscated, the approval of which was scheduled to be determined in a matter of mere days after the shooting. Fortunately, the effort failed and the treaty was not signed, but that does not end the matter; the U.N. has simply rescheduled for reconsideration to give them time to attempt to make the treaty more appealing (the US was not the only country to refuse it), and a new a sales pitch (more mass shootings, perhaps, such as the Temple shooting in Wisconsin?). I have already screamed my warning thoughts on the gun-grab topic in a series of posts cited at the end of this post. For the best overview of the treaty with both sides of view, visit the Judge Ben C. Green Law Library.

Motive 2: Less commonly discussed, but also logical; the Web is flush with stories stating James’ Father is a whistle blower set to testify in a Federal matter which would, if found damaging, be a potential motive for using as Patsy, his son. His father developed software used to monitor banking transactions for fraud, and it is said that his program detected and can prove where the trillion dollar losses really went — as criminal profits. Imagine trading a finding of mental incapacitation instead of a death sentence in exchange for favorable testimony. As result, his Father is said to have been scheduled to appear as a witness in a Federal Court as a whistleblower. At this point I would be remiss if not admitting the factual value as a motive is based on early speculation, as there has been no useful verification of any such court appearance. It would take considerable study of his Father’s situation to find facts before I accept it as factual, but it is sufficient a red flag as to deserve such study. Read about that, here.

Even more interesting, as a related mater, is that TDKR plot line is rather a strong parallel to the financial crimes under consideration. It may be EXACTLY THE REASON why James, and why TDKR. There is an excellent review of the film with that view in mind, here, with some useful background info on the software in question. Later, we will see there is also a potential reason why Century Theaters.

Motive 3: Also a matter to be determined more concretely, the third potential motive remains quite consistent with my findings in case after case when working with targeted individuals. I’m talking about victims of PCT, which is what I fear James Holmes is based on the wealth of clues in the greater picture. Such persons are always targeted for a reason. Almost always, that reason is FEAR of what the individual knows about some covert and illegal or immoral government Agency’s doings.

James Holmes, like so many of my clients, worked in projects associated with such an Agency; in his case, DARPA, the Defense Advance Research Project Agency. The work, in fact, specifically dealt with matters relating to Political Control Technology, though that is certainly not how they choose to describe it publicly. Learn more about his work, here.

What I find particularly interesting is that, in Jame’s case, the location where this work was undertaken was only two main intersections away from the shooting, essentially on the same Street. Just as interesting, is that he lived just ten minutes by foot away from work, only a couple of blocks from the theater, also just off of that same street, again. We will find some significance in that, later.

Being a PCT victim or even a threat to the entire PCT program would not in and of itself be a motive to set up an elaborate ploy to have them put away for life. There would be simpler solutions. However, if considered such a threat, it would make them a more logical candidate for Patsy among other candidates for a project which was slated regardless of if it was to be James, or not. Better to kill two birds with one stone than two stones.

With these motives and curiosities in mind, let’s tear into the conflicts inherent within the official story:

 James Holmes was a patsy

What we told and can see raises serious questions

“Conspiracy theories” happen when there are obvious questions ignored by officials in government and media (Elephants in the room), where presented facts do not jive one with another. This is always the first hallmark of a cover up in a major story. I should make clear to the reader: there is NEVER a cover up UNLESS there is a CONSPIRACY. A cover up REQUIRES it, in fact, or it becomes impossible to arrange — especially when the “the only person of interest” is behind bars and cannot so arrange. Now, because media has not asked ANY of the questions herein, we must assume such a cover up has begun. Failure to question is a tell-tale hallmark which soon enough results in charges of ‘conspiracy theorists’ when challenged.

So let’s take a look at some of the questions I find most troubling, and address them. I’m not talking about external matters such as reports that FBI pulled a terror warning regarding theater attacks being a possibility. I’m talking about shooting details, doing so because I’m anxious to be called conspiracy theorist one more time, because I love pointing out that’s just a labeling game to avoid discussing issues. So, after I ask all the questions, I’ll present the ONLY plausible scenario which answers all the questions without contradictions, a replay of the crime as a false flag event involving multiple participants.

QUESTION 1: Why did a Judge, within mere hours of the shooting, order all records sealed in this matter as ‘contrary to public interests?’ What facts had been uncovered that early in the investigation which prompted such a concern? It would not be until well into the next day that facts even started to usefully unfold for such an important consideration. I’d like to know who moved for such a ruling, and the reasoning behind their request (stated reasons do not always equate to actual motive). Could it have been a call from Washington D.C., which sparked it?

QUESTION 2: Why was there a training exercise based on the same exact scenario underway at the same time, less than ten minutes away? The Denver Post reports such an exercise indeed took place at the Parker Medical Institute. A common theme in ‘terrorist’ events thought to be a false flag operation, is the holding of a training exercise for exactly the same type event at the same general place and time. This was certainly the case for Sept. 11 and the Subway/Bus bombing in London, for instance, and I seem to recall it being so with the Saran gas attacks in Japan.

QUESTION 3: Why did media first talk about the “lone shooter” effecting his crime by “kicking in the EXIT door?” Like all patsy shooting events, the initial stories given to and relayed by media without question create the all-important ‘first and lasting impression’ in the minds of the public. It would be impossible for anyone to kick in a fire door designed to open outward. In like manner, with the confusion clearly in place, no one could know with confidence at the outset that there was only one shooter, even if true.

No witness could rightly so claim. No Cop would be so foolish as to make such a statement. I would hope no reporter would invent it. But several early news accounts, including one aired on FOX Radio (play the second audio file on the linked page) a single witness identified (in print) only as ‘Pam,’ said exactly that.  Why, unless a ‘planted’ statement for Wag-the-Dog* media manipulation? The first known airing was actually from NBC affiliate, Channel 9, on the scene. From their unthinking quote of ‘Pam’, news people everywhere simply repeated the line, just as mindlessly, and as if fact. Isn’t that a great way to get an initial mental image out into the public?

Was Aurora shooting a DOD or CIA operation?

James Holmes * An expression whereby news is manipulated by Men in Black to make people think things are much different than they really are,
James Holmes    popularized and hilariously illustrated in the Book and film of the same name starring Dustin Hoffman, Robert De Niro, 

QUESTION 4: Why did ABC News deliberately take James’ Mother’s quote out of context to indicate ‘they had the right person’ in arresting James? She has officially protested through legal counsel that that statement was in confirmation to HER identity upon first contact by phone. Again, media twists words and thereby assures ‘first and lasting impressions,’ a known Wag-the-Dog tactic.

QUESTION 5: Who lobbed gas canisters into the Lobby? At 3:29AM, as part of an interview with Police Chief Dan Oates after capture of James Holmes at the rear of the theater complex, a Channel 9 report  reveals a lone gunman entered the lobby and discharged a gas canister and THEN went on the shooting spree. As we will soon see, there are other reasons to believe someone was in the Lobby doing just that. In fact, multiple someones. Did the man in the Lobby have orange hair? No one is telling, no one is asking. Why?

We might reasonably assume the above report an error, an assumption. But in a Web radio interview with witness Tim McGrath who was in theater 8 adjacent to the theater 9 where the shooting took place, we learn that while the shooting took place, there were FLASHES seen with the loud pops described as coming from behind, which would be the lobby/hallway area. It would, after all, be impossible to see any visual signs of activity in the adjacent theater where the shooting took place. So there really was additional activity in the lobby area such as flash bang smoke grenades, as confirmed by the other reports. Moreover, the Police dispatch audio tape appears to reference the front door (Lobby entrance) as being ‘blown out,’ at about 3:50 into the audio.

These events could in no way be undertaken by James Holmes, as he would need to take the time to exit the lobby after throwing canisters and make his way all the way around the building to the back, change clothes, arm himself, and then enter via the EXIT… in time for them to go off in the Lobby and be seen and heard while he is shooting. It makes no sense. How is this possible without at least one accomplice?

QUESTION 6: Who opened the EXIT in theater 9 for James? We now have multiple witnesses who saw someone within the theater open the EXIT door something like 20 minutes before it was used by the shooter. Without stating it in so many words, it is clear Police think it Holmes who opened the door, and then exited the theater through the Lobby to go around to the back where he prepared himself and then used that door.

But there is an oddity, here, because the man opening the door is not described by any witness as having blazing orange hair.  Why not? It was not seen on the shooter, either, because of his head covering. Why wear the hair if not intending to show it? We will come back to this question. But we also have to ask, by what logic or reasoning would James not simply take the EXIT directly to his car and then return? Why return into the theater/lobby area, at all, unless it be a different person with yet another assignment to be fulfilled who did so?

QUESTION 7: How did the shooter gain entrance to REAR EXIT of the building at the time of the shooting? We know how he gained entrance to the theater through the EXIT door but that doorway led only to a short hallway serving theater 10 and 9 together, to yet another secure fire door opening to the lot where James’ car was parked. How did that door get opened for James? No one on the Web has addressed this question before me, and I think I know the answer.

Was Aurora shooting a DOD or CIA operation?

The next installment asks these questions:

 
James Holmes • Who warned people not to use the EXIT doors advising the shooter was outside, and why?
James Holmes • Why did the shooter waste bullets shooting at a blank wall causing bullets to enter theater 10?
James Holmes • Who wore the second gas mask and used the second rifle found at the scene?
James Holmes • Why did the shooter not shoot the most logical victim?
James Holmes • Why did that victim describe the first weapon used was a Rifle, when another says shotgun – who was indeed shot by a shotgun?
James Holmes • And more…
 
PLEASE: Comment (page bottom, or contact me), Rate (at page top), Share/Tweet this article. Visit my Reader Forum to promote your own cause or URL. 

What the Federal Reserve Has Cost You Personally


This article will help you estimate the (%#@!) huge number

by H. Michael Sweeney
Copyright©2012, all rights reserved. permissions to reproduce by request only to proparanoid at century link net

 Shut down the fed

Note: If you oppose the FED, you may wish to review the 24 Presidential Campaign Planks proposed to specifically cure the problem with respect to the FED, the National Debt, Tax, and how money should be printed.

Description: Newspaper clipping USA, Woodrow W...

Beginning of the End

The Federal Reserve Bank System (the FED) was established in 1913 by some serious international con artists who used deceit, lies, and disinformation to trick Congress into approving it. The FED is indeed a privately held corporation run for the significant benefit of the banks as well as some ‘tricky-dicky’ (a bribery, of sorts) benefits to legislators and the President, also at citizen expense. When I say ‘banks,’ I mean three kinds.

1) The big New York banks and big European International banks reap huge reward, as they were the ones who established the FED and thus get to be the first to feed at the trough. They control it, not Congress. Like any private corporation, they have a Board of Directors and a functional CEO. Sure, they listen to the President and Congress for input on what they are might SHOULD do, but in the end, they DICTATE what they will do and sell it to government as a ‘cure’ for whatever sparked their input.

2) Next comes the International Monetary Fund (IMF) and World Bank, which are creations of these same bankers, in partnership with other globalist interests from the likes of the Bilderbergers, Council on Foreign Relations, Trilateral Commission, the Club of Rome, modern Illuminati all say some (me included). Despite their flowery and sugar coated statements about what they do, they work no differently than the FED member banks to profit at the expense of everyone else.

They get a goodly go at the trough because Congress now allows the FED to print US currency for their exclusive and seemingly limitless use in addition to all the money Congress asks them to print. So, in effect, the U.S. Currency has become a de facto ‘world currency,’ but not to make the dollar stronger, because it actually weakens it through inflation over which Congress has little to say. And you and I pay the interest on it all. It’s called The National Debt, and your IRS tax payments largely go directly to the bankers to help repay it (but it will never be paid in full, as it is impossible to keep it from growing larger).

3) Finally comes all other American Banks, who get minimal benefit but who get all the regulation and dictates the FED chooses to supply, policies designed to stifle small bank growth while encouraging the New York/International banks of the first group to grow even bigger. THIS, by the way, is exactly the OPPOSITE of what the FED was originally created to do, the opposite of what they claimed it would do in order to gain Congressional approval. In short, they lied, and this post will tell you all about that.

 Shut down the fed

Undue Banking Fees:

Because it is a Monopoly controlled by the heads of the various key banks who sit on the Board of the Federal Reserve, they make it less profitable for the lesser banks; forcing them to charge more for banking services, which in turn allows the big New York and International banks to do the same, the difference being the Fed banks enjoy a greater boost in profits under FED policy. But this is a mere annoying pittance compared to other costs, and we will not include it in your personal cost calculations. That said, there is this one instance I’d really like you to take a look at, because it is quite symptomatic of banking abuse, and because I’m hoping you will contribute to a fund to provide relief to the family the article discusses.

Shut down the fed

Usury Interest:

The Federal Reserve is a Private Bank

It is neither Federal, nor a Bank

Even when the FED sets extremely low interest rates, it translates to Usury (excessive) interest costs to those who borrow from the bank. Why? Under the same laws which set up the FED, banks were allowed to loan out more money than they had in the vaults, at a ratio of ten loaned dollars for every dollar they had. You deposit $100, and they loan $1000. The payment on that being $100 a month, lets say, meaning they then loan out yet another $1000 each month. But where did that extra $900 in money come from, and the $900 after that, and so forth?

This money, which keeps going like some grand pyramid scheme as long as borrowers keep coming forward and payments keep coming in… DOES NOT EXIST. It never existed, and will not exist until you pay it back over time from your income. It was created out of thin air out of nothing and becomes real only by the sweat of your brow (you are a ‘debt’ slave producing money for the banks). But it even gets better than that for the banks.

When you get the loan, they credit their books with the fake money, and debit your account with a charge of the value of the loan, and give you a check. You can’t easily use that check to buy a car or house, so you deposit back into the bank so you can write your own check for the purchase. The deposit of the loan money shows as a credit to both your account and theirs, at least until your check for the purchase clears, at which time they are effectively reversed. In the meantime, they can loan $10,000 more on your $1,000 loan, and yet again every time you make a payment, they can loan yet more to create another slave and a whole new pyramid of loans that will result. Pyramid upon pyramid.

So in essence, you and tens to hundreds or even thousands of other persons are paying interest on the same original $900 worth of money created out of nothing, and the money loaned, and the money paid back. The bank was never at risk of their own money (it was your $100), and yet will be earning tons of interest for nothing and nothing on nothing and nothing on nothing on nothing, again and again, and yet again. THAT is Usury, and some State Laws which forbid Usury have been successfully used to stop foreclosures because the banks were unable to prove they had any risk for which to justify interest charges or harm as defined by breach of agreement to pay. It is a hard case to win, but it has been done.

The upshot on Usury? For most folks about 17% of their income goes to such interest charges. We will be using that information later. No need to calculate anything, yet. S

 Shut down the fed

Unemployment Costs:

Pickets protest unemployment policies in Scran...

1964 Scranton Jobless Protests

In my case, I’ve been unemployed because of financial chaos due to FED control (inflation/recession cycle, one begets the other) for a total of 8 years in my life. The use of the formulae herein compensates for that in terms of ‘would have beens,’ but the actual earnings computed thereby are in error by an incalculable sum due to the simplified methods employed.

If you are like me, you may therefore wish to add in an estimated ‘unemployment cost,’ at the end based on some other, arbitrary sum. There are two ways unemployment impacts the number you will wish to reflect upon. The obvious is lost wages, but if you use the math suggested, that will be compensated for automatically. But while unemployed, both you and your would-be employer were not paying into your retirement funds as required by the Social Security Act, and any special employer provisions for other retirement programs. You may wish to consider that when we get to the section on lost retirement income.

 Shut down the fed

Inflation (a hidden tax):

The sneaky benefit to government of the FED is that they can print money anytime they want to fund anything they want without actually having to pay for it with a new Tax Bill. That’s why the same rats tend to get reelected, because unless they vote to raise a tax, voters tend to give them little mind and presume them doing their job. Of course of late, a lot of voters are realizing that the other reason to get upset is when Rats don’t read Bills and vote them in only to find them unconstitutional, taking away our freedoms, and bringing us closer to (fill in the blank and please review these links, here: communism, socialism, fascism, police state, martial law, armed revolution, etc.).

Start with the first year you were an independent citizen wage earner living on your own. Hopefully you remember your hourly wage or how much you made a year. Multiply your hourly wage by 2,200 (hrs. in a typical work year) to approximate a year’s earnings, or just jot down your annual wages. We won’t even bother with overtime wages, unless you wish to fudge on the 2,200 figure because you have always had a lot of overtime. An annual figure would naturally include it already.

Go to the inflation calculator and see what that wage equates to, today.  Example: in 1971 I earned $3.25 hr., or $7150 a year, which equates to $38,056, today. Get your answers, and then continue…

But wait. In my most recent pay hike I earned $14.25 an hour, or $31,350 a year. For most of us, we are earning less today than we should compared to the information at the calculator. This is our clue something beyond mere inflation is afoot, and we need to compute and identify what it is.

So subtract the two and we get $6,706 — income lost this year in wages over what the inflation calculation indicates we should have been making. Multiply that times the number of intervening years and divide by two and you end up with the (approximate) total cost of inflation to your earnings capacity — because all those pay increases you got over the years were increasingly worth less and less than their face value. In my example, its $137,473, which I’ll refer to later as ‘lost income.’

Now if you were lucky, you managed to earn a heck of a lot more in pay hikes over the year, so you may end up with a negative number. Great for you, at least until we figure the rest of it out… because the more you earn, it seems, the more it costs you in the end. So run the calculation, anyway, and jot down the resulting negative number so you get an accurate final answer.

Next go to the gasoline historical price chart and see how much gas cost that first year you worked (use the blue line). In 1971 it was 36 cents a gallon(!) Now gasoline is not a true indicator of inflation because it is also subject to forces of supply and demand, and some of you may be protesting my wishing to use it. I have a reason:

Many things we purchase such as the real estate sector also do not see their pricing held to the inflation standard, either, and are less determined by supply and demand than they are by control of interest by the FED. Real Estate, especially, which is a major portion of one’s budget even if a renter, is a so impacted. As it happens, most sectors’ price fluctuations tend to follow that of the price of gasoline in at least a general way. So bear with me please, as gasoline is the only easy-to-use baseline indicator that allows us to address all inter-related phenomenon across multiple sectors. It is at least going to get us into the ballpark.

Subtract from that first year’s gas price from today’s price at the pump ($3.50 here) to get the inflated price of gas. Next, in order to use gas prices as an indicator and factor we can use to compute its impact, we need to normalize that figure based on $1 worth of gas in the starring year, which means we need to compute a multiplier, a ‘factor.’

To do that, divide the original price into one dollar to get your factor (.36 into 1.00 = 2.78 – you could have bought 2.78 gallons). If the original was greater than $1, your factor will be a fractional part (e.g., 1.75 into 1.00 = .57 gallons). Now, THAT figure is the cost in inflation for a single dollar spent on gas, at today’s price. I’m saying it also is generally representative of all money’s spent for anything. Since it also impacts the value of money in savings, it applies to pretty much everything you’ve ever earned, because every cent you’ve earned has been spent on something, even if just savings (you were buying future money).

So finish calculating how much you’ve earned, which generally will be quite well approximated by going back to our earlier calculations and adding the first years earnings to the last years earnings, multiplying by the number if years between, and dividing by two. For me that’s $7,150 + $31,350 = $38,500 x 41 = $1,578,500 divided by two = $789,250. Never made millionaire, did I? Few of us did, or will.

To this figure we should now add back in the ‘lost income’ figure from the earlier section. $789,250 + $137,473 = $926,723 in ‘inflation adjusted income.’ Damn. Still not a millionaire!

Now multiply that times the computed gasoline factor to see the inflation cost for goods and services (and savings) over the lifetime. $926,723  x 2.78 factor = $2,576,290.  Well, looks like, thanks to the FED, that I SHOULD have been not just a millionaire, but a multi-millionaire!

Yes, I know… that figure is  more than we earned, isn’t it? Don’t worry, it will make sense when we sum it all up, which follows our final calculations:

 Shut down the fed

Back to Usury

End the Federal Reserve

Yes!

Now its time to add in the Usury figure (17% of our income); we multiply the above total by 1.17 to get $3,014,259.  That difference between that number and your actual income of record is how much the banks have indirectly benefited by your gleeful participation in their little credit scam put over on the Federal government, and citizens, alike. That is what it actually cost you for your share of their profiteering.

In my case, I subtract the $789,250 (my actual life’s earnings), for a cost of $2,225,009. And 80 cents, but who’s counting. The FED certainly hopes YOU aren’t counting, and Congress, too, for the matter. Because if you did, you might feel like sparking some sort of major reform that started with getting rid of everyone in D.C., as well as the Fed. Occupy might end up being who sits in Congress, at least until the National Guard showed up.

Problems with my math?

If you were sharp, you probably have come up with an objection to my reasoning regarding the 17%. Sure you can argue that some of that money (interest on debt) did NOT go to banks at all, but went to other sources like oil companies, manufacturers and retailers who extended us credit, and even to taxes… but don’t forget each one of them in almost every case, to earn your purchases, borrowed from the bank to build their product, factories, and finance doing business.

Like you, they had to pay it back. Which is exactly what the taxes are for.

Regarding taxes, bear in mind that the bulk of all tax revenue goes directly back to the Federal Reserve to pay them interest on the money they print, which is nothing more than an I.O.U. from government to the FED. All of it remains Usury, and your 17% went to cover that one way or the other, as did that of businesses. Oh, excuse me. I forgot. The BIG corporations, the ones who tend to be run by Boards with financial officers who come from the banking industry… tend not to pay ANY taxes. So that’s another way you and I get the shaft by the FED, I suppose. But it does not change the equations or reasoning used herein, it simply makes it less possible to ever repay the National Debt.

 Shut down the fed

Lost Purchase Power:

And, as stated, this huge total is not how much money you ‘spent,’ because it equals far greater than you even earned. But IT IS HOW MUCH VALUE IN TODAYS DOLLARS YOU’VE LOST IN PURCHASE POWER. If there had been no inflation, no Usury (and you did not borrow, but paid cash) and you continued to get those pay raises in an economy largely free of inflation and recession, your income would be the same as we adjusted for, and possibly higher (one can so argue, because in a healthy economy, raises are more frequent and tend to be bigger).

We need to restate that, because it can be confusing.

YOUR PURCHASE POWER for a given dollar would have remained more steady and be more like what it was way back when, which in TODAYS dollars, would buy you that larger figure in purchasing power. You would truly have an improved standard of living based on wealth (not merely improvements in technology), instead of what you really have, which is an illusion of a better standard wrought only by technological benefits, but dampened by a diminutive purchasing power.

Put yet another more pictorial way, you would be driving a sports car, a motor home, an SUV, and a pickup truck, have a nice boat and mooring, and a luxury home AND retirement home, both well furnished – instead of an apartment and a three-year-old family car. Everything would be paid for and you would have significant cash in the bank. There would be extremely low taxes by comparison, as well, because there would be no National Debt and therefore no interest for government to repay. There would be elected officials in government responsive to the people, not slaves under control of banks and corporations.

 Shut down the fed

Lost Retirement Income

If you are currently retired, the math herein points to many ways you are likely enjoying a smaller monthly retirement income than you would be enjoying otherwise. If not yet retired, you have that to look forward to with displeasure. The topic is far too complex to include in the formulation as there are too many kinds of retirement incomes, but the two which deserve our dialog.

are Social Security and Stock investment plans as part of a corporate retirement package over and above Social Security  (IRA and Investment Funds, etc.).

Investment funds because, in the FED induced cycles of inflation/recession, all these forms of investment have suffered significant stock valuation losses. In a way, these in turn actually drive the cycle to wilder extremes and amplify the problem (e.g., a large institutional investor in the education sector may be forced to raise tuition, or a manufacturer to lay off employees and close a plant). So this form of investment is significantly impacted, especially in this last financial meltdown and the FED’s response to print trillions to give to banks ‘too big to fail.’

As for SS, had not the FED increased the National Debt so much beyond any hope of repayment, Congress would never have had need to dip into the SS reserves you and I paid into the fund for our retirement, and it would therefore now actually have money sitting there WITH EARNED INTEREST, and our checks would be significantly larger than they are now. As it stands, we will already earn less than we put in, unless we live well beyond the expected lifetime and they don’t pull the plug on payments altogether, as they keep discussing as a ‘viable option.’ Yeah, do that and find out how many senior citizens own guns, me thinks.

So feel free to compute a number by whatever means you wish for your losses to retirement income, if you like, and add it in, as well.

 Shut down the fed

Add it all up

THAT is your cost for the FED. The only think perhaps missing is the medical bills you will pay from the Coronary you have reading this, or the repairs to your car and your body from the bullet holes gathered trying to crash into the nearest Federal Reserve Bank to get your money back. Uh… don’t try that unless perhaps filming for the next Jackass movie.

You now work nearly half the year to pay your fair share in taxes. It won’t be long before you work year ‘round’ and still lose ground. Tennessee Ernie Ford, a famous Country star of decades gone by had a number one hit song about financial slavery born of the early coal industry in the Appalachians. It seems like the best way to end this piece; Sixteen Tons:

                                                       You load sixteen tons what do you get
                                                       Another day older and deeper in debt
                                                       Saint Peter don’t you call me ’cause I can’t go
                                                       I owe my soul to the company store

 Shut down the fed

Oops! One last cost, not financial

If, like me, you choose to go public with your protest of the Fed, you will be joining the ranks of an elite group of troublemakers who pay yet another price: You will get on a list of people to be watched by the FED Cyber Police. They don’t really have a ‘Police,’ but they apparently feel themselves above the Law and have sought to establish a Cyber unit to track the doings on line of people who criticize the Fed. Here is their actual Request for Proposals on how to do this.

Presumably, at some point, they will have Congress deem us terrorists (too late, actually… they’ve already done that). So perhaps instead they will expand the NDAA powers and allow not only the Military to vanish or assassinate us, but also the FED. Come on, Obama, your banking friends need just a little more of your (unlawful, tyrannical, fascist police state) power.

But what am I saying? The FED has more money than… well, even exists, it seems. They don’t need Congressional empowerment. They can afford to pay contract hit men, cyber thugs or gun totting variety. The Mafia does it and gets away with it, mostly. The CIA does it and gets away with it, entirely. The Military now does it and gets away with it, Obamaly. I’ve even heard accusations that the FBI has, empirically.

All I have to say is (expletive deleted) FED, your days are numbered shorter than mine. Take your best shot.

NOTE: If you enjoyed this post, you may also like the test you can take to see if you are a Concerned Web Citizen or just another Web Walleroo?

Updated: Confidential Conversations that Never Happened…


A parody of real-life mechanisms in conspiracy cleanup (coverup contingencies)

by H. Michael Sweeney
permission to duplicate granted provided reproduced in full and all links remain in tact, with credit given to the author and proparanoid.wordpress.com as source.

James holmes is a patsy in a false flag operation

Update Aug. 29, 2012: As result of the popularity of my multi-part post on the Aurora shooting which is the most exhaustive review of facts to date, and because of the revelations the investigation involved in the effort have afforded, this post is woefully inadequate and no longer reflects the true concerns. Therefore, this update is actually a major rewrite to make it more in harmony with the true facts, rather than the early conjecture available on the Web at the time of its first writing. Additions or changes heralded in red. Any original material remains in tact, but in strike-through text, as I do not wish anyone to feel the material may have been censored for any other cause. Article begins:

Whenever the official story starts to have cracks in it, the cleaners go to work in Wag-the-Dog fashion, and power is applied to the weakest pressure points to make things ‘better for all concerned.’  As one CIA operative (one of the clean-cut train hobos at Dallas in ’63 set to cause a ruckus if the Grassy Knoll escape plan looked like it might be compromised) told me, “History is what we say it is, and it will not be changed by you or anyone else.”

Er… OK. But don’t fault me for trying the truth now and then, and forgive me with any liberties I take in the absence of good solid news reports full of details and hard facts… a matter which always makes me wonder what we are really dealing with…

James holmes a mind-controlled patsy?
 
                                                                                Come the terror at night,
                                                                                            or by day,
                                                                                the citizens Plight is,
                                                                                            or it may,
                                                                                be which one is right,
                                                                                            by what they say,
                                                                                who is guilty of the fright,
                                                                                            and how shall we repay?
 
                                        I wrote that with Aurora in mind, but it applies to a long American history of dark bumps in the dark, does it not?
James holmes is a patsy in a false flag operation
Aurora was a horror of unimaginable evil, yet I can’t help but believe the cause of it was a greater and even more unfathomable evil than we can know. This parody is to help you see the several reasons I am so concerned. But I remind you I was not there, and I cannot know enough but to be dangerous to those that do. Read between the lines on that statement, as it has double meaning.
James holmes is a patsy in a false flag operation

Added section: Ring: The receiver is lifted, but no greeting is offered, the Executive seated at the expansive desk in a plush office recognizing the calling number.

Voice on line: “The script will be ready on July 20. Adjust your plans accordingly.” The line went dead and the Executive hung up, and then dialed a number of his own.

Executive: “I’m green lighting Drum Roll. Production can begin at once, with a shooting date set for July 20. Make sure the cast and props are ready by then, and there are no problems in the storyboarding and rehearsals.” And then he hangs up.

Note: Double speak is the intelligence community perfected ‘art’ of speaking in the open about something by couching key matters in allegory or parable form. In the above example, we see how someone in the motion picture industry might talk about a film production… that was really something else… Drum Roll being the role played by the drum magazine in the shooting. Storyboarding means contingency planning, and rehearsals means that everyone knows the plan forwards and backwards. The script refers to the scheduled date of the theater shooting exercise which ‘just happened’ to be being held the same day of the shooting some ten minutes away off the same Freeway access as enjoyed by the Century theater. Interesting because high-risk intel ops such as would be true of a false flag operation, tend to employ a similar ‘drill’ for a like event on the same day and in the same city. This provides a cover operation so that if an operative is compromised, they will not be arrested and the plot can be aborted without exposure of the truth. End of added section.

James holmes is a patsy in a false flag operation

Ring:  “Hello? News reporter here.”

Recognized voice: “The word’s going out to all our newsies… be sure to point out he had over $20,000 in high-tech equipment, and have another story by someone else suggest there is reason to believe there were Islamic ties, and be sure to play up the gun violence angle. And be sure not to mention he worked on that DARPA* project to develop super soldiers. That U.N. Treaty must be signed!”

News reporter:  “But the shooting just happened. There’s been no time for an investigation, yet. What’s our source?”

Recognized voice: “Don’t worry about that. Just say ‘sources close to the investigation,’ and people won’t be smart enough to know any better… except for the ‘conspiracy buffs’ which you already know how to deal with.”

News reporter: “Right. By simply calling them that and ridiculing them for it. Got to hand it to Walter Cronkite for making that work so well in the JFK thing.”

*D.A.R.P.A. Defense Advanced Research Project Agency

Note: Walter was ex Army intel, and would have been a logical go-to person as part of CIA’s Operation Mockingbird which infiltrated news media with, by various estimates, over 1,000 operatives from CIA or on their payroll under the table. Since JFK, no conspiracy investigation has made good headway because media keeps trotting this excuse to ignore the valid questions of civilian investigators and investigative authors, or Engineers, Pilots, and other professionals who come forward with challenges to the official explanations. As one well known Comedian like to say, “I don’t get no respect, you know?”

James holmes is a patsy in a false flag operation

Ring: “Hello, Police Public Spokesperson.”

Recognized voice: “You have to stop talking about the possibility of the shooter having help. He’s a lone nut, nothing more.”

Police Public Spokesperson: “But people are trying to figure out how he got he got the larger weapons into the theater and all that gear. We already have one witness who’s been quoted as seeing someone open the Emergency Exit for him.”

Recognized voice: “Don’t worry about him. We have that covered. And don’t worry about what people think. We tell them what to think. Just do as I say.”

Police Public Spokesperson: “O.K. If you say so. Has everyone else in the loop here been so advised, or do I need to have an excuse to pass along?”

Recognized voice: “The key people are our people. We have it all covered, just like L.A. with the RFK matter.”

Note: In Robert Kennedy’s assassination, the Radio Dispatcher who controlled what Cops did that day and the Chief of Police were ex CIA. No wonder cops did not pursue the Woman in the Polka Dot dress, and the L.A.P.D. destroyed all the evidence which indicated more shots were fired than contained in Sirhan Sirhan’s gun, and did not protest that the fatal wounds came from the other side of his body where Thane Ceaser, a security staffer to a CIA involved military contractor had been walking directly behind Robert at the time of the shooting.

James holmes is a patsy in a false flag operation

Door shuts behind the lone interrorgator (spelling on purpose), and he takes a seat before the exhausted man at the desk. Interrorgator: “You told our people at the theater that you saw someone open the Exit Door for the shooter a  second smoke grenade thrown from the opposite direction?”

Eyewitness: “Yes. I couldn’t see who because it was silhouettes against the movie screen might have thrown it.”

Interrorgator: “That’s impossible. We know the shooter was a lone gunman, and had no help. We have lots of people lined up who are going to be saying they saw it differently.”

Eyewitness: “I know what I saw. I was not more than ten feet away, and he crossed in it flew right in front of me.”

Interrorgator: “That’s not what you saw. The confusion and fear of the shooting has simply confused your memory. All you saw was someone getting up to take a leak or buy some popcorn. He never opened the door was some action on the theater screen from the movie…   your mind has simply played a trick on you and filled in the blanks.”

Eyewitness: “No. I’m certain.”

Interrorgator: “Listen, kid. I’m going to lay it on the line for you.” Grabs him by the collar and jerks him halfway across the table. “I’m telling you, and you’d better listen up real careful like, you didn’t see that, you were confused. If you tell anyone you saw that, something bad might happen to you. There are a lot of people upset about this, and some of them have tempers and are looking for someone to go after. They don’t think very clearly, and I’m trying to keep you from getting seriously hurt… or your family for the matter. Do I make myself clear?”

Eyewitness: “You’re threatening me? With those people watching behind the mirror with cameras?”

Interrorgator: “You’re Goddamn right I’m threatening you.” Slaps face. “I sent those people on break and killed the camera, but in five more minutes, I’m going to call them back and we are going to be asking you the same question I started with, and you had better damn well tell me you were confused, or you and yours have NO F***ING FUTURE.” Shoves him back into his seat. “Do we agree on that, or not? Because if not, I can’t protect you!”

Eyewitness: “O.K.  O.K. You win. I’m confused. I didn’t see anything except someone going to get popcorn.”

Note: Something almost identical to this happened to witnesses at JFK, RFK, and MLK, as well as the Flight 80o shoot down. Witnesses are often ‘told what they saw’ and told they were ‘confused by events,’ to allow investigators to later say their initial statements were not useful because of duress under stress impacting their memory.

James holmes is a patsy in a false flag operation

Ring: “Hello, Fire Department.”

Police Department: “We need you to take a Ladder Truck over to the shooter’s place and look in the window for us.”

Fire Department: “Why? We’ve never done anything like that before. What’s going on?”

Police Department: “We just want to make sure its not booby trapped. You need to tell us if it is so you we can send the Bomb Squad out.”

Fire Department: “Did the shooter say something to make you think there’s a bomb?”

Police Department: “Uh… sure. Yea. Something like that.”

Fire Department: “Well why not just send the bomb squad.”

Police Department: “Well, uh… I’m just doing what I’m told. I think they want high visibility with the press. Uh… you know… to make everyone look good. You will look good. We will look good… on TV… our small community will look good on national TV.”

Fire Department: “Whatever you say, Chief.”

Note: At a disadvantage with no concrete facts, there may have been a legitimate reason for asking the Fire Department to participate. Yet they did eventually send the Bomb Squad in and the first thing done was to use robots. Did the robots go in the window? Not that I’ve seen on video. No, they went in the front door. How do we know this? Because we have video of the bomb squad breaking out a portion of the window which would have needed to be removed if using the window for insertion of robots… doing so from the inside after the robots had finished. So why would there not have been a booby trap on the door blowing the robot away? That’s the FIRST thing I’d booby trap if of a mind to booby trap anything.

James holmes is a patsy in a false flag operation

Ring: “Bomb squad.”

Familiar Voice: “Be sure to blow a lot of stuff up at the practice demolition site afterwards.”

Bomb squad: “Why not just use the portable unit we always take with us? There’s nothing here large enough to require the demolition site.”

Familiar Voice: “TV coverage. Want to look good on TV, don’t you? Besides, the order comes from the top.”

Bomb squad: “Fine. We can have the rookies get in some practice at the same time.”

Note: The portable units (Mobile Explosion Containment Units) can contain significant blasts, but are not necessarily used for on-site demolition of bombs. They would perhaps prefer to instead transport explosives to a demolition site, as the units provide increased safety for such transport. However, some devices might be judged unsafe for transport, and should perhaps be destroyed at the crime scene. WHEN MULTIPLE DEVICES are found, there are several interesting possibilities which drove my inclusion of this portion of the dialogs.

a)    The devices were too large to detonate on site. But we know that is not the case because we saw them on TV and they were small explosions (keep in mind that they use explosive devices to explode the bombs, so whatever blast you see is necessarily larger than the bomb by itself would have been.) Further, had this been the case, they should have likely been too large for collective transport, exceeding the safe operating limits of the mobile unit. But they were not shown making multiple trips to accommodate multiple bombs, so we again know this was not the case.

b)   Despite the number of devices, their cumulative potential for damage is collectively within the ability of the chamber’s ability to safely transport through populated streets. IN SUCH A CASE, the bombs would normally be disposed of at the bomb squad’s facilities as a SINGLE BLAST. But we saw video on the news of multiple blasts in close proximity. This CONFIRMS they were not big blasts individually, and should have been done as a single blast. Why not? I can think of only one reason: Publicity stunt.

James holmes is a patsy in a false flag operation

Added section: Ring: “Executive speaking.”

Voice on line: “There’s been a problem with that special script for Drum Roll. It hasn’t been received by the Publicist.”

Executive: “Well where the hell is it, then?”

Voice: “We think it might be lost in the mail room for some reason.”

Executive: “Well get the… ah, you know… the ‘Director of Security’… to go search for it, then. That’s an important matter useful to Advertising and Promoting Drum Roll to the viewing public.”

Voice: “How do I do that? What do I tell them is the reason?”

Executive: Pauses. “I don’t know. It’s your job to solve problems like this.” Pauses again. “But try this; tell the Publicist to call the Director and complain about a suspicious package… and use that to get Security involved. Use your imagination.” Slams the receiver with a curse.

Note: Director of Security is their contact in the Police Dept. The Publicist is the Psychologist, or someone acting on her behalf. For some strange reason, the Psychologist indeed contacted Police about a strange package which showed up on her desk with no name on it, which turned out to be nothing but a text book being returned by a student. The explanation was concern, after the news about the bombs in James’ apartment, that it might be a bomb from James — in which case I wonder how James managed to put it on her desk while he was under arrest. For an even stranger reason, Police then searched the entire mail room to find the ‘script’ James allegedly mailed explaining in detail his plan to shoot up the theater. Strangest of all is that it was sent 8 days prior to the shooting. End of added section.

Next dialog, and the last, most telling of all…

Interrogator: “O.K., James. You want to tell us why you did it?”

James: “Did what? Why I am under arrest?”

Note: Jame’s reaction after the shooting is no different than Sirhan Sirhan (RFK), Jack Ruby (Oswald), David Chapman (John Lennon), Arthur Bremer (George Wallace), Squeaky Fromme (Reagan), and John Hinkley (Reagan), and others: No attempt to escape, in many cases going limp or calmly waiting nearby for arrest. Many of them have no recollection of the event, or have a single line of ‘political’ thought on it which they repeat, or start to explain and then just at the critical moment, change the subject.

These are all known methods of dissociation symptomatic of programmed Manchurian Candidates who are incapable of ‘confessing’ the truth, as they genuinely are not aware of it. In this case, we know he simply waited in his car and put up no resistance. What we don’t really know is if he has told the Police anything at all, but must presume not, or it would have been all over the news in some form or another.

So I’m taking the liberty and risk to assume, here. Please forgive any Ass made out of You and Me thereby. If I’m way off base, I’d be just as happy with the thought you may have gotten some entrainment value from it… because if I’m not off base, we are all going to end up mad enough to bring down the government and lynch some people.

James holmes is a patsy in a false flag operation

Please rate this article at page top, tweet/share, and comment. All comments welcome, good or bad.

Updated: Mind-Controlled Mass Shootings Don’t Change My Mind


The NWO can’t have my gun until I first get rid of the bullets

Update March 7 2013: Did the FBI undertake a covert ops to check out my gun collection (see image below, which I’ve posted both here and at my Facebook pages). Today and a few days ago, five individuals claiming to be insurance company employees entered a) my apartment; b) my daughter’s apartment; c) her husband’s father’s and brother’s apartment… claiming to do an insurance evaluation for the Landlord. They seemed to be focused on wanting to find and check out the water heater…

And so they looked in my bedroom (my office)… and then the closet…  my (other) daughter’s bedroom and then the closet… the kitchen/dining area… the living room… and the master bedroom… and then the closet (where they FOUND the water heater)… and then continued looking for it in the other bathroom, the deck, and the deck closet… and then the attic storage area. It was OK, though, because they asked permission before opening any door, just like a law enforcement Officer would do when they had no warrant.

Having found the water heater behind a wall of stored items in the closet, all they could see of it was that it existed, as evidenced by about 12 square inches of tank wall and a couple of water pipes. I’m sure that was all they needed to answer their important insurance questions, because they didn’t ask anything about it, take pictures of it, or move anything to get a closer look. Yep. Insurance work is getting easier all the time thanks to the marvels of digital photography…

which, while they did not use it on the water heater, it being so important to them, and all, they did use it take pictures of other important things, mostly with deft hand-movements that concealed the camera from view. When I said something about the deck rotting after catching one of them using the camera, he even took a picture of the deck! Very important to water heater evaluations, yes?

Now would be a good time to mention that the woman looked very much like a known FBI agent from the Portland Office. Only the last time I saw her was when I was targeted by FBI for writing about Flight 800 friendly fire shoot down. I got visits from ONI, as well, and even one MI-6 chap who issued a death threat, and indeed over the next couple of months there were attempts on my life (not by him, but by local LEA, one of whom had been driving a car with license plates blocked out of Langley with DVM).

But I might be wrong. Might not be her. Kind of hard to tell because she had PUT ON SO MUCH WEIGHT! Any more and she would have a hard time passing the physical requirements. Kind of weird seeing someone who used to have a waist line now shaped more like a kite, and thinking them FBI. Kind of makes you loose confidence in government’s management capabilities, does it not?

Now is also a good time to mention that one of the men was seen wearing an old T-shirt from a known local CIA front… the one with all the technical toys hanging on his tool belt, and a clipboard. Anyone with the old T-shirt (the new ones are different) is usually an EX employee turned private contractor for hire. That front’s specialty is covert surveillance and eavesdropping. So if they left anything here, they had better real quick find a way to come and collect it before I can find it (I CAN VERY LIKELY find it), and end up filing a law suit, or at the very least go public with documentation of it.

The kicker? The image is NOT even mine, though I wish it was. It is a random image pulled from the Web for whom no original owner is evident (probably their wish). But FBI would rather do the knee-jerk, fear-based, jump-to-conclusion elaborate covert ops thing than bother to do a little research. Obama does not have enough money to pay for (anything we citizens need) but can spend $20,000 to convince the Landlord to go along with a phony insurance inspection ploy instead of $2 for a Google search? LMAO.

End of update – though I’d like you to know there are a series of companion posts which happen to also be my most popular posts (use My Posts menu item and select Top Ten).

Is FBI targeting people who have gun collections?

by H. Michael Sweeney

I may not speak for all gun owners, but i’m betting my sentiments are not at all isolated nor inconsequential. Look up the word consequence, to fully understand my meaning.

I hope the bluntness and inflammatory nature of my remarks are not lost on anyone. I deeply regret any need to write this, and in such tone, in the face of the unimaginable grief and wounds to the heart and soul of those who lost loved ones in Aurora. And though I’m sure they will not appreciate my remarks in the least, I cannot remain silent: I am incensed by the tragedy, doubly so because I see the darkness which surely drove it, and thrice so because it just happened to be within minutes of what is believed by many to be the intended new Capitol of the NewStates of America, also of that same darkness.

The shock value is for the Sheeple who need to listen up for a change and actually notice what’s happening around them outside of the sound bites they are fed daily. The NWO cares not for 71, 7,100, or 71,000,000 of us, if our loss will further their cause. We are but mere pawns who are allowed to pay for our own victimization that they may remain the 1% in power.

It’s also a warning to the governments of the World, including the United Nations and United States, that gun owners are the last people who give a damn about false flag terrorism as impacting our decisions on gun ownership. So if you want our guns, get yours, and come and try to get ours, if you can. A piece of paper, no matter whos’ signature is on it, or what flowery, tear jerking, politically correct words appear above it, will be of zero meaning to most of us, because we know why you want the guns, which brings us to the last reason for my blunt words.

Because it’s also battle cry for the rest of us, because we are so fed up with the BS that you spew forth so endlessly as if yours was the only side of the coin. We suffer from what I call too many Fascists Syndrome. You folks in power can have your Police State, but a piece of paper won’t get our guns, FIRST. You will have to take your chances after the fact, and we will see what happens when you try to go for it. You will have to get the answer to the age old question you’ve been afraid to openly ask, the hard way. And that question is…

Will we resist you, or won’t we?

Your actions dictate the form of debate: the power of words, or of bullets.
Either way, Citizens remain ready to open dialog. (wall photo – click)

You have feared the answer for decades, ever since the military Coupe your elders failed to make good on in 1933. The fear of what the answer might be to that question is all that has slowed you down, isn’t it? YOU, by the way, define the answer to that question, yourself. You define it by your actions. You would have no fear and not even need ask the question in that ‘kinder and gentler government’ you promised a few years ago, but woe unto you for the kind of government you are intent upon building, today. You risk much with every step closer to goal you take.

The Camel has a weight limit, and even we know not the final straw

What do I know that I should dare confront you so firmly? Because for decades I have researched you, and have written seven books about you. In particular, I’ve studied your preoccupation with Political Control Technology, that evil originally called mind control. There is one aspect of that, the Manchurian Candidate being a suitable (though technically incorrect) descriptor; a programmable killer, or agent, one capable of executing any foul instruction and being unable to later recall the deed, much less the instructions. MPD/DID through RSA torture is the proper term, along with hypnosis and chemical catalysts. Psychological magic mixed with Satanic methods of ancient times.

Words that should scare even you: Aritchoke, MK-Ultra, Often, Chikwit, NAOMI, and on and on. Patsies and real killers created by assembly line, rendered sleepers into society for activation on need, and often targeted with other forms of PCT to make them seem conveniently crazy should you need to call them into play. Am I crazy to say these things, or too close to the truth for you to dare even acknowledge I said them?

That is modus operandi, is it not? Ignore accusations as it tends to make people think there is nothing to them, and make the accuser go away once they get tired? Sorry, it’s been twenty years and I’m still talking, still accusing, and I am in no way alone. As result of our persistence, more and more Sheeple wake up each day, especially among the programmed sleepers. Fear us, for we are Legion! And guess what? We don’t even fear you enough to be anonymous about it.

Down to cases: to be specific, I accuse…

…that virtually every mass shooting incident has been a programmed shooter since the Texas Tower sniper felled 48 people, killing 16, in over an hour and a half of terror in 1966. And, as if some CIA operation gone wrong, media just magically stopped talking about it and kind of swept it under the carpet. Examine as many of this kind of incident as you wish, and please, by all means, lets include assassination attempts.

It is almost impossible to find an exception where the shooter was not under psychiatric care, commonly involving hypnosis and or drugs associated with CIA mind control research. At times, actual ties to CIA MC scientists or similar clues are found. Can you say, ‘Catcher in the Rye?’ How about Dr. William J. Bryan. Ring a bell? Manchurian, indeed!

It is almost impossible to find such an event where, if the shooter was captured alive, they were able to recall the incident. Why? Because of complete dissociation and honest lack of memory of the event, a known CIA methodology associated with mind control of the type in question.

It is ludicrous to the point of absurdity that any Sheeple remain unaware of the consistent ‘coincidence’ that Congress always seems to have legislation in hand ready to vote upon which ‘protects us’ from just such events as quickly as they happen, and quickly ‘strengthening gun laws.’ Gee, I have not noticed much improvement.

It was by this means that you have gotten us to register our weapons, which is something we should never have done, because now you know who and where we are, for that day when you come to collect our bullets. And you know, things still have not improved much with that law, have they?

It was by this means that you banned whole categories of weapons which would make any such effort more difficult for you, because you might end up collecting the bullets too quickly for your taste. And still no improvement in sight. Imagine that.

It was by this means that you made the good name of the NRA, of which I am not a member, and do not represent or speak for, but whom I respect, to seem to many Sheeple some dark kind of conspiracy, when in fact, it is YOU who conspire, and you who deceives. Still no improvement. Do you really think these laws through when you write them? Ever heard of logic?

And, it was by this means that you used even greater terrors to establish whole new agencies to spy upon us and to assault us with little dirty tricks in hopes of guiding us to the Sheeple category, but — SURPRISE! You instead created more of us and made us more adamant than ever. As I said, it is YOU that determines your fate, your actions which dictate the answer to your rightly asked question.

So, especially those of you in Congress, please keep that age-old question in mind when it comes time to consider outrageous gun or ammo taxes, and especially the U.N. sponsored international gun grab that gives up some more national sovereignty to the New World Order at the expense of the Constitution. Set the stage for a one World government and leader… who is that, again? The Antichrist? You really think we will allow that, do you?

Remember theses questions, and remember this: you can fool some of the people all of the time (the Sheeple), but you can’t fool the rest of us at any time, because Fascists are to us a known entity, and we do not listen to anything they say, except to hold it against them at their tribunal!

But what am I saying? I don’t even own a gun. But I assure you that I will, and millions more with me, if you force the matter to a head. Act wisely, for no one can easily stop what you might unleash through unbridled arrogance and lust for power.

Your move.

In the Rearview Mirror: When You Think You’re Followed


How to know, what to do about it

by H. Michael Sweeney

This is an updated summary review of information (not excerpted) from my book, The Professional Paranoid: How to Fight Back When Investigated, Stalked, Targeted, or Harassed by Any Agency, Organization, or Individual (available in ebook, CDR, and hard copy)

mirror

No longer proparanoid.com
Men in Black hijacked that
Now it’s proparanoid.net (click)

This post is a companion to a post on cell phone security made just hours earlier. Unless you want me to repeat that introduction, you should quick like a bunny hop over to and read it, first, as it sets the stage. I’ll wait right here…

Good. Now that we are on the same page, it seems pretty clear that if a person is being monitored in their phone calls, then there is a good chance they are under what’s called a full surveillance net. That means that in addition to your phones, everything from your mail and computer communications, and your travels away from home, not to mention everything you do in your home, including sex, are likely being monitored.

Only a Police State is paranoid enough to watch people like that… and perhaps voyeurs. One could argue then, I suppose, that sexually repressed people tend to be the ones who apply for and take these kinds of jobs with the intelligence agencies. Take a look at CIA spooks David Ferrie and Clay Shaw of JFK assassination fame, for instance. That may be why TSA has so many perverts groping people. I don’t know. Sorry, couldn’t resist.

Methods of being followed

Cover of "Enemy of the State"

Cover of Enemy of the State

Watch the Will Smith/Gene Hackman movie, Enemy of the State, and you quickly learn there are all kinds of ways: satellite surveillance, tracking devices, helicopters, cars, on foot, and even by microphone relay and telephone calls (where we left off). Now, with all that sophistication comes an associated cost factor, which tends to favor use of low tech except for the greatest of national security risks or fears. So you, as mere ‘suspect’ in some government imagined conspiracy to blow up your underware because you think for yourself and talk openly in an attempt to get others to use their minds, are more likely to be followed by car or tracking device than the more exotic means available.

Funny thing about tracking devices, though, is there is almost always a car following that signal. You won’t see it, but it’s almost certainly there. The purpose of the device CAN be simply to make and keep a record of your travels for later consideration, but usually, they prefer to be close enough at hand so that once you stop at a location, they can show up and see WHY you stopped… since the satellite isn’t going to be watching for them. So for my purposes, it’s the same as being followed by car.

The only difference is, you won’t see them in the rearview, but like the folks you do find there repeatedly, you will see them at destination if you are alert and can find a good observation post you can use with some useful patience. I’ve even found them there waiting for me. That was a fun story, just part of a five year running war with the paranoids, but I’ll save it for another time, perhaps. But other than them showing up like that, we need another way to know for sure.

How to detect being followed

First, how NOT too, would be more in order. Don’t keep looking for it, and don’t assume a car you see with great frequency is a bad guy. You are by and large a creature of habit taking the same routes to get to any given repeat location at roughly repeat times of day. So is everyone else. So I don’t get nervous because a certain rusty Chevy is within a few cars of me several times a week. Actually, I don’t get nervous even if I do think them following me, because I don’t want it known that I know. So I don’t spend all my time looking up at the mirror. If you insist on that, get a rearview camera ‘so you don’t back up over some kids,’ and glance at that furiously.

Just be aware of cars around you all the time, with NORMAL use of mirrors and glances out windows. Don’t be looking like you are on the lookout. Trust your instincts, and if you ‘feel’ like you are being followed, you may just be. At such times, or when you THINK perhaps a given car is just a little too familiar (or a driver), find something about the vehicle or driver you can identify later, and make a mental note, or a verbal note to a VOX (voice activated) pocket recorder, or a written note to a memo pad, or even a photograph. Note time, place, and descriptor.

The descriptor is going to be whatever thing is easy to recall. It might be a dent or rust spot, an odd paint job, a bumper sticker, or, where nothing else works, the license plate. Now there is a trick to remembering plates (more correctly, making them memorable) that I like to use when part of the sequence is alphabetic. RTU 035 is the plate of a vehicle associated with a CIA operative (more correctly, a retired Marine Forward Observer hired to ‘observe’ me by CIA).  I glanced at that plate and forever now can recall it by my memory trick.

Simply make up some nonsense acronym out of the alpha portion and repeat it to yourself a few times while looking at the vehicle, not the plate – you want to associate the plate with the color, make, model, etc., not some rectangular piece of metal that might be replaced at some point. So in my example, I said ‘Rat-Tailed U-boat 035, Rat-Tailed U-boat 035, Rat-Tailed U-boat 035.’  Done deal. Next vehicle, please.

You can do the same with drivers. I enjoyed making up names for them, too: Pug Face (looked like a boxer who didn’t retire soon enough); The Professor (very dignified); The Liddy Man (wore a Liddy mustache and similar hair line; The Cuban (you get the idea). You will often see these people in multiple vehicles over time. It really gets interesting when you see the same groups of people in the same cars others of the group had earlier driven. And above all else, the most important clue… when you see the same people or cars at differing parts of town on the same day… especially if in those groups. Been there, done that.

But I did also employ both audio and paper, and photographs, as situations allowed or required (such as when there is not a lot of time and the situation is fluid). At days end, I would compile these all into a database, and once a week, for those repeat offenders (that’s the important clue), I’d go down to the Department of Motor Vehicles and run the plates to see who owned them.

Can’t do that any more here in Oregon, they made it illegal. Most states won’t allow it unless you are law enforcement. No problem. Lots of friends and relatives in law enforcement. Don’t have any? Make it happen, but you need to become GOOD friends because to help, they risk getting into trouble. It’s very helpful if you are both politically incorrect, at least privately (cops don’t get very vocal about that in public, it tends to cause unemployment).

Benefits and reasons for detection

There are some serious reasons beyond merely confirming suspicions. Example: Amazing thing about the DMV reports was, for me, that more than half the plates were reported either as stolen, non existent, or blocked by law enforcement. Actually, they didn’t tell me the later part, they just said non existent. But all I had to do was lean a bit and read it for myself on their CRT screen. Point is, such reports give you a clue as to who is involved. If you don’t get a lot of stolen/non existing plates, then you are probably dealing with private investigators, corporate goons, or some kind of group of idiot citizens thinking themselves above the law. Else, its government of some kind.

In my book I go into a lot more depth with some intermediate steps designed to better identify your players, and to give yourself tactical advantages. In fact, overall, its one of the larger sections of the book, and its followed by whole sections on offensive and defensive actions that fit into any knowledge gained about who is involved. That’s because, when you know who, you know why, and when you know all that, you know their limitations and what to expect from them when you do X. You start to control events forcing them to react to you instead of you being a mere bug under an unseen microscope subject to their manipulations.

And, it talks about their manipulations, and how to deal with them. They will attempt manipulations, mostly to see your reactions as part of establishing a psychological profile (another reason for cameras in the bedroom, I suppose). So one trick I talk a lot about, is ACT, don’t REACT. Learn to control responses: consider if the situation might be observed and a reaction expected or hoped for, and then decide if you want to confuse their profile by acting differently, or not. Then ACT in the decided upon manner, forcing them to react to YOU (incorrectly react, at that).

The other tactic I discuss at length worth mentioning, here, is that sometimes it is valuable to deliberately blow their tail by letting them know you know they are there, and who they are. They have to report that to their superior and they and/or their vehicle need to be replaced. Very embarrassing and a great chuckle to be had by all. It should cause escalation of methods used to follow you to levels harder to detect, at least by the time you’ve blown two or three tails in a row. Ideally, you do not want to escalate to that point where you can no longer detect the next level, so you would stop using this ploy when you felt that point was near (for most people, that’s going to be the first level, so this will be a moot dialog).

But for others, it has great advantage, because the book tells you how to use that information to better determine just who is following you. For example, at one point I was able to determine it included bounty hunters working with Clackamas County Corrections, and was able to thereby identify the Corrections Officers involved, as well as eventually find the high Sheriff himself (some decades back, of course — the current Sheriff is not a known CIA in-place asset) was involved.

I happened to catch him unaware on video following me on foot near where I worked, and that allowed me to identify him from a coincidentally convenient interview conducted on TV that very week. Subsequently, I openly took pictures of him when he drove past me in a car with Federal plates (neat trick for a County guy, eh?). Never had much trouble with HIM after blowing his invisibility, and in point of fact, after filing a complaint, he ‘retired’ from his elected post. The bounty hunters relocated, too.

The escalation which followed (that was the purpose, recall)?  They advanced to use of trucks and vehicles belonging to and driven by employees of an electrical contractor which was later identified as a CIA front operating under 17 names in four States. So that told me my problem was NOT with the Sheriff’s department, but a much bigger fish. The whole story came out well in the end, as I was able to gain enough proofs to force them to stop bothering me, and even to pay me for damages.

Those proofs included not just my own problems with them, but documenting their spying on local government and high tech industry here in the Silicon Forest… letting themselves in wee hours of the morning past high security locks, using flashlights, and presumably, collecting and replacing recorded tapes. It’s all in my book, as well as another book, Fatal Rebirth, which better explains their growing paranoia since 1947 and on into the future. Ever heard of the Unified Conspiracy Theory? Check it out.

Then you will know why I make them so paranoid. Seriously, though; email me if you are having these kinds of issue: proparanoid at century link net.

Compare 1776 to 2013 and Tell Me Where You Think You Live


Congress and the President are pressing their luck just like King George.

Do you even know where you live? This review will help you figure it out. In 1776 the colonists were upset about quite a few serious matters, though the one the history books tend to focus on is taxation without representation. That was just the tip of the iceberg, of course, as any scholarly review would reveal. I’m not all that scholarly (though the information here comes largely from a ten-year research effort in the writing of my four-volume book set, Fatal Rebirth, which fully documents the more key claims herein). On that basis, here goes…

Power of King George vs. Individual Rights

king

King George III

In 1776 King George held the power of life-or-death warrant over citizens without a need for illustrating just cause. Because of the Magna Carta, there was at least the requirement for a trial, but near indefinite detention was possible by delay in setting  a court date; a useful tool for dealing with dissidents.

In 2012, King Obama has unlimited powers of life-or-death warrant which have reversed even the Magna Carta, not to mention the Constitution and Bill of Rights, and without illustrating cause, he may order a citizen to be covertly vanished by Military with indefinite suspension, or have them assassinated, tortured, or turned over to foreign powers for same; the ultimate tool for dealing with dissidents, called vanishing.

Freedom of Speech

In 1776 Sedition laws forbad anyone from criticizing the Crown, leaving one subject to arrest for so doing. This included books, newspapers, and public forums in town squares, where it was common for people to stand on soap boxes or provided stages and speak to whatever crowd might gather. Soldiers were always nearby.

In 2012, King Obama enjoys control of Media as benefactor of CIA’s infiltration of Media in Operation Mockingbird as well as centralized ownership of Media outlets by the Military-Industial-Intelligence-Media complex (MIIM). There is a continuous concerted effort in Congress to neuter our ‘soap box’ called the Internet, and a recently passed Bill bans effective public gatherings for protest of government actions. It is virtually guaranteed that when you do attempt public speech you will be hassled over permits by Police, and be videoed by FBI if enough people show up, and be at risk of agent provocateur tactics and Police assault and arrest. While full control of media access tends to neuter free speech, actual Sedition Bills have non-the-less been openly discussed as ‘a need’ in Congress. That is coming, and could end up in book bans and book burnings.

High Cost of Goods and Taxation

In 1776 the East Indian Trading Company, a kind of corporate partnership between the Crown and the monopolistic firm, was almost the sole provider of transportation of goods to America. As result, the cost of goods were already burdened with excessively high shipping costs, upon which the Crown imposed high tariffs. Goods from America to Europe also had to endure these charges. Ergo, Boston Tea Party.

In 2012 King Obama in de facto corporate partnerships with monopolistic banks, insurance, medical care, and pharma industries to covertly levy the largest tax hikeseen in the history of the World. The cost of all goods and services if further raised by additional hidden taxes in the form of inflation from printing of trillions of dollars of money in yet another corporate partnership with the banking sector. This form of massive partnerships in another time was called Fascism, a descriptor of Nazism. We merely call it Socialism, today, a subset of Communism. Ergo, the

"The Destruction of Tea at Boston Harbor&...

The Destruction of Tea at Boston Harbor

Tea Party.

Taxation Without Representation

In 1776 King George’s taxation upon the Colonies afforded no voice for American citizens in the King’s Court.

In 2012 there are only a small handful of Congressmen such as Rand and Ron Paul who have dared to vote according to their constituents wishes. All others are too preoccupied in their paranoiac fear of ‘terrorism’ to care what We The People think. Tell me then, who represents you in Congress? Really?

Freedom of Religion

In 1776 King George required that the Church of England was the only valid faith. This one fact caused a tidal wave of emigration to America, where it was hoped that one could worship as they would choose. In the colonies, however, attempting to exercise contrary faith anywhere but in your own home could result in court charges of both sedition and heresy against the Minister.

In 2012 King Obama is not quite there, yet. While the government has a history of persecuting and destroying (to include mass murder of Davidians) radical faiths, and there has been a consistent CIA and military backed effort to establish a ‘one-world’ religion which is more favorable to government needs, the worst Obama seems to be guilty of is favoring Islam, and false claims of Christianity to which he has repeatedly turned his back. His religious claims are, at best, as useful as his claim of citizenship.

Note: In my Book MC Realities I document the movement more closely than the overview shown here, which fails to mention the details (as are in my book) regarding the role of the D.O.D. (Army Psyops) and CIA (mind control) in forming such a religious organization, all of it undertaken, as it happens, at the U.S. Marine facilities at 29 Palms and The Presidio. And that’s exactly where it is unfolding, today, but now in ‘civilian’ operation by fronts established for the purpose, the military reservations ‘gi